Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Gain insights on interviewing, career growth, and leadership in cybersecurity. Learn to navigate company culture, contribute effectively, and seize opportunities for professional development.
Explore Chrome extension vulnerabilities, security considerations, and potential exploits. Learn about architecture, headers, and isolation techniques for safer browsing experiences.
Explore MITRE ATT&CK framework to enhance threat intelligence and cyber defense strategies. Learn implementation tips, detection techniques, and industry examples for improved security posture.
Practical advice for aspiring cybersecurity professionals on resumes, interviews, and overcoming imposter syndrome. Insights on navigating the competitive entry-level job market.
Explore techniques for creating malware without coding, covering keyloggers, ransomware, and persistence methods. Learn about ethical hacking and cybersecurity vulnerabilities.
Explore payload-agnostic sandbox detection techniques, including sleep evasion, encryption, and user activity analysis. Learn to build profiles and implement various detection methods across languages.
Explore software-defined networking vulnerabilities, focusing on OpenFlow, controllers, and REST APIs. Learn to manipulate traffic flow and exploit SDN weaknesses.
Explore real-time serverless malware detection using YARA and Binary Alert. Learn about scalable security tools, features, and implementation for enhanced threat protection.
Comprehensive exploration of Zero Trust Networks, covering theory, implementation strategies, key systems, and practical considerations for enhanced network security.
Explore reverse engineering and exploitation techniques, covering low-level programming, memory vulnerabilities, and essential tools for cybersecurity enthusiasts and professionals.
Explore cybersecurity challenges in healthcare with insights on task forces, device manufacturing, disclosure programs, and legacy systems from industry expert Josh Corman.
Explore one engineer's journey into InfoSec, covering education, certifications, challenges, and strategies for success in the field. Gain insights on networking, mentorship, and personal growth.
Explore the evolution of password security, common pitfalls, and best practices for creating strong, memorable passwords in this informative cybersecurity talk.
Explore advanced threat detection using AI and transfer learning techniques. Learn about active learning, data sharing, and improving phishing domain detection across organizations.
Explore the impact of security solution commoditization on the industry and professionals. Learn strategies to stay relevant in an evolving landscape.
Get personalized course recommendations, track subjects and courses with reminders, and more.