Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from DefCamp. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore post-quantum signature models using Verkle Trees, covering quantum computing impacts, cryptographic systems, and novel signature schemes for enhanced cybersecurity.
Explore wiper malware anatomy with CrowdStrike experts. Learn techniques, data handling, kernel drivers, and more in this DefCamp 2022 cybersecurity presentation.
Explore internet fragmentation amid military conflicts, examining global examples, cyber attacks, and potential solutions for a more connected digital world.
Explore the analysis and exploit development for CVE-2022-24086, a critical Magento RCE vulnerability, presented by a security researcher at DefCamp 2022.
Explore logging challenges in cybersecurity, including sensitive data handling, storage, analysis, and access control. Learn best practices for secure logging in various scenarios.
Explore deceptive operations and honeynet design for enhanced cybersecurity. Learn about threat intelligence, network telescopes, and attacker behavior to protect assets effectively.
Comprehensive guide for beginners in bug bounty hunting, covering scope definition, research techniques, tools like Axiom, and reporting strategies for successful vulnerability discovery.
Explore entrepreneurship in cybersecurity with insights on team building, product development, and industry challenges. Learn from real experiences to navigate the startup journey effectively.
Explore gamification in SecOps education, featuring challenges, tools, and dashboards. Learn about innovative approaches to cybersecurity training and their impact on skill development.
Explore post-quantum cryptography and novel random number generation techniques, focusing on latest developments, successful attacks, and improved methods for enhanced security in the quantum era.
Explore automotive cybersecurity needs, methods, and future challenges in this DefCamp talk. Learn about regulations, attack points, and industry-specific issues for vehicle protection.
Explore vulnerabilities in Android stalkerware apps, including server leaks and compromise scenarios, with insights on reporting to vendors and potential security implications.
Retrospective on IoT vulnerability research, exploring reusable attack vectors, authentication issues, cloud implementations, and command injection in MQTT and RSTP protocols.
Explore threat intelligence integration for prioritizing detection sources, enhancing security strategies with MITRE ATT&CK, and leveraging internal and external intelligence for effective threat modeling.
Explore Zero Trust security: its principles, implementation, and impact on cybersecurity. Learn about identity governance, least privilege, and maturity models for effective protection against modern threats.
Get personalized course recommendations, track subjects and courses with reminders, and more.