Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Psychology
Data Analysis
Digital Marketing
Introduction to Psychology
Nutrition, Exercise and Sports
Computing in Python I: Fundamentals and Procedural Programming
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore Chinese APTs' tactics in software supply chain attacks, examining notable incidents, code breakdowns, and open-source vulnerabilities to understand and mitigate these sophisticated threats.
Learn strategies to effectively communicate cybersecurity risks and initiatives to executives, enabling better decision-making and business alignment in the digital age.
Explore logic-based vulnerabilities in major platforms, focusing on duplicates and business logic flaws. Learn techniques to identify and exploit these weaknesses through real-world case studies.
Explore effective communication strategies in cybersecurity, addressing business impacts, vulnerabilities, and solutions for various threats including phishing, insider risks, and ransomware attacks.
Explore reverse engineering fundamentals, tools, and strategies for information security. Learn legal aspects, safe practices, and real-world applications through war stories and CTF challenges.
Explore a serverless SIEM for efficient threat detection, covering log ingestion, analysis, notifications, and automations in cloud-native environments.
Explore Ghost DMA attacks, their mechanisms, and mitigations. Learn about the SeDeFuS conundrum and its implications for system security in this technical presentation.
Explore latest threats to mission-critical SAP applications, including cloud vulnerabilities, attack lifecycles, and remediation strategies. Gain insights from research labs and real-world examples.
Honest discussion on mental health in cybersecurity, exploring challenges, personal experiences, and effective self-care strategies for professionals in the field.
Explore the future of vulnerability advisories with CSAF, VEX, and SBOM. Learn about critical system security, risk assessment, and automation in the evolving landscape of cybersecurity.
Explore deception strategies against automated adversaries, focusing on finite state machines, multiple plans, and automated planners. Learn test setups, results, and future implications.
Explore search engine deoptimization techniques used by Gootloader malware, including compromised WordPress sites, malicious SEO, and process hollowing. Learn about server infrastructure and potential countermeasures.
Discover how a security expert exploited vulnerabilities in a Norwegian bank's systems using only pen and paper, revealing critical flaws in identity verification and account access processes.
Explore innovative approaches to cybersecurity training through gamification of tabletop exercises, enhancing engagement and effectiveness in scenario-based learning.
Explore lessons from cybersecurity applied to privacy tech, discussing compliance, product excellence, and the evolving relationship between privacy and security in business contexts.
Get personalized course recommendations, track subjects and courses with reminders, and more.