Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from DerbyCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore practical Open Source Intelligence techniques for gathering and analyzing publicly available information, enhancing your cybersecurity and investigative skills.
Explore Windows shell parties with PowerShell, learning combat techniques, configuration, and leveraging PowerShell for enhanced system interaction and security testing.
Explore rapid web resource assessment techniques, including crawling, scanning, and fuzzing, to enhance cybersecurity and identify potential vulnerabilities in web applications.
Explore techniques for identifying and exposing cybercriminals, focusing on advanced methods to unmask malicious actors in the digital realm.
Explore techniques for generating effective wordlists from public GitHub repositories, enhancing penetration testing and security assessments.
Explore new features in Metasploit Framework, including infrastructure updates, exploitation techniques, and enhancements for various platforms and protocols.
Explore facial recognition technology applications in digital forensics and information security, enhancing investigative capabilities and security measures.
Hands-on exercises reinforcing fundamental cryptography concepts, enhancing understanding of encryption techniques and potential vulnerabilities in cryptographic systems.
Explore strategies for cyber conflict and information warfare without escalating to full-scale war, examining tactics, ethics, and geopolitical implications.
Explore emergent vulnerabilities in security systems by drawing parallels with ant colonies and fish schools, revealing insights into complex adaptive behaviors.
Explore common IT issues, their impacts, and effective solutions in this insightful talk by Frank J. Hackett, offering practical strategies to improve your organization's IT infrastructure.
Explore advanced redirection techniques and their security implications in web applications, delving into lesser-known vulnerabilities and potential exploits.
Explore insights on establishing and expanding hacker spaces from experienced panelists, covering community building, resource management, and fostering innovation in tech-focused environments.
Explore vulnerabilities in SOHO routers, covering security risks, testing methods, and exploit development. Learn about command injection, directory traversal, and buffer overflows with live demonstrations.
Explore graph-based security analysis techniques for enhanced threat detection and risk assessment in complex network environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.