Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Computer Science
Cybersecurity
Max MSP Programming Course: Structuring Interactive Software for Digital Arts
Fundamentals of Neuroscience, Part 1: The Electrical Properties of the Neuron
Psychology of Personal Growth
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Insights from NYC Cyber Command's frontline experiences, covering operational design, governance, threat modeling, and future cybersecurity strategies for urban environments.
Explore defensible social architecture in the era of big data, behavioral economics, and cyber threats. Learn strategies for modern detection systems and leveraging economics for better security policies.
Overcome barriers to proper network segmentation with practical strategies, including the coin slot rail approach, to enhance security and maintain efficient internal traffic flow.
Explore empirical exploitation techniques, quantifying security research, and analyzing various attack vectors and vulnerabilities across networks and devices.
Explore the vulnerabilities of phone systems and network storage devices, uncovering security flaws and potential exploits in administrative interfaces and user access.
Explore machine learning applications in information security, covering fraud detection, spam filtering, and data quality improvement for enhanced cybersecurity strategies.
Discover effective career strategies for information security professionals, including resume tips, job market insights, and leveraging social media to advance your cybersecurity career.
Explore cybersecurity careers, professional development, and next steps with experts Josh Corman and Beau Woods in this Q&A session from BSidesLV 2014.
Learn to optimize your Intrusion Detection System (IDS) with expert techniques for sensor placement, rule customization, and traffic analysis, enhancing network security and reducing false positives.
Explore innovative approaches to threat intelligence, focusing on data collection, automation, and analysis using the Diamond Model for more effective cybersecurity strategies.
Explore SSL certificate validation, CA testing, and session caching. Learn key aspects of cybersecurity through Star Trek-themed modules for enhanced understanding and practical application.
Explore insider threat prevention through human indicators, log intelligence, and analytics. Learn to detect and mitigate risks using real-world case studies and correlation techniques.
Explore VPN behavior under packet loss, analyzing timing patterns and network algorithms to understand security implications and potential vulnerabilities.
Explore blind hashing for enhanced password security, covering attack vectors, online vs offline attacks, and strategies to scale and protect against various threats.
Explore innovative techniques for enhancing password-based encryption through I/O hardness, comparing schemes and costs to improve security in the digital age.
Get personalized course recommendations, track subjects and courses with reminders, and more.