Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore cybersecurity challenges, computational limitations, and the implications of "snake oil" solutions in modern technology and threat detection.
Explore multidisciplinary approaches to combat misinformation campaigns using information security paradigms, focusing on influence tactics, mitigation strategies, and community-building efforts.
Explore IoT security challenges, outbreaks, and solutions with insights on smart TVs, herd immunity, and enterprise perspectives. Learn practical strategies for safeguarding connected devices.
Explore the Birthday Paradox in cybersecurity, learning its applications in incident response, investigations, and threat detection. Gain insights into mathematical concepts and practical implementations.
Explore Windows Group Policy vulnerabilities, reconnaissance techniques, and attack paths. Learn defensive strategies to protect against Group Policy exploitation.
Explore distributed randomness generation, its importance in cryptography, and the innovative drand protocol for secure, decentralized random number creation.
Learn to operationalize cyber threat intelligence using ATT&CK framework for improved security and detection capabilities in your organization's environment.
Explore secure authentication methods, including tokens, OAuth, and SAML. Learn best practices, common issues, and key takeaways for implementing robust authentication in your systems.
Explore machine learning techniques for sandbox detection, feature selection, and model deployment in cybersecurity. Gain insights on client-side models and data acquisition strategies.
Explore Azure Log Analytics exploitation as a covert channel, uncovering potential security threats in cloud logging infrastructure and learning mitigation strategies.
Explore a platform for automated code scanning and vulnerability data streaming, designed to provide developers with fast, timely information on potential security issues.
Comprehensive guide to adversary simulations in GCP, covering initial access, persistence, privilege escalation, C2 using Google products, and data exfiltration techniques.
Explore ransomware's evolution, attack methods, and defense strategies. Learn to sharpen your cybersecurity skills against this persistent threat through real-world examples and practical mitigation techniques.
Learn how Ginger achieved HITRUST certification efficiently, saving time and money. Discover strategies for streamlined compliance, including self-assessment, program integration, and leveraging existing controls.
Explore war stories and learn to build secure infrastructure access systems. Analyze classic incidents and discover why the industry's "zero-trust" definition may be flawed.
Get personalized course recommendations, track subjects and courses with reminders, and more.