Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Discover strategies for gaining and showcasing penetration testing experience, overcoming imposter syndrome, and navigating HR in the cybersecurity field.
Explore Chinese APTs' tactics in software supply chain attacks, examining notable incidents, code breakdowns, and open-source vulnerabilities to understand and mitigate these sophisticated threats.
Learn strategies to effectively communicate cybersecurity risks and initiatives to executives, enabling better decision-making and business alignment in the digital age.
Explore logic-based vulnerabilities in major platforms, focusing on duplicates and business logic flaws. Learn techniques to identify and exploit these weaknesses through real-world case studies.
Explore effective communication strategies in cybersecurity, addressing business impacts, vulnerabilities, and solutions for various threats including phishing, insider risks, and ransomware attacks.
Explore reverse engineering fundamentals, tools, and strategies for information security. Learn legal aspects, safe practices, and real-world applications through war stories and CTF challenges.
Explore a serverless SIEM for efficient threat detection, covering log ingestion, analysis, notifications, and automations in cloud-native environments.
Explore Ghost DMA attacks, their mechanisms, and mitigations. Learn about the SeDeFuS conundrum and its implications for system security in this technical presentation.
Explore latest threats to mission-critical SAP applications, including cloud vulnerabilities, attack lifecycles, and remediation strategies. Gain insights from research labs and real-world examples.
Honest discussion on mental health in cybersecurity, exploring challenges, personal experiences, and effective self-care strategies for professionals in the field.
Explore the future of vulnerability advisories with CSAF, VEX, and SBOM. Learn about critical system security, risk assessment, and automation in the evolving landscape of cybersecurity.
Explore deception strategies against automated adversaries, focusing on finite state machines, multiple plans, and automated planners. Learn test setups, results, and future implications.
Explore adversarial machine learning's current landscape, including attack types, vulnerabilities, and defense strategies. Gain insights into visual understanding and notable research in this critical field.
Explore cutting-edge cybersecurity research, from USB vulnerabilities to compiler techniques, with insights on emerging trends like citizen developers and domestic violence apps.
Learn techniques to bypass antivirus using open source tools like Malleable C2, MSFVenom, and PowerShell. Explore examples and scripts for more effective penetration testing and security assessments.
Get personalized course recommendations, track subjects and courses with reminders, and more.