Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from DerbyCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore innovative security threats and vulnerabilities in airport terminals, uncovering potential risks and discussing countermeasures for enhanced travel safety.
Explore iOS app reverse engineering techniques and learn to identify vulnerabilities in mobile applications for improved security and penetration testing.
Explore the world of free cybersecurity tools and resources with Gene Bransfield. Learn how to leverage open-source solutions for effective security testing and analysis.
Explore sandboxes from a penetration tester's perspective, uncovering vulnerabilities and evasion techniques to enhance cybersecurity defenses and threat detection capabilities.
Explore advanced techniques for database exploitation and security vulnerabilities with expert Alejandro Caceres in this comprehensive cybersecurity presentation.
Explore open-source solutions to simplify PCI DSS compliance, reducing complexity and costs for businesses while maintaining security standards.
Explore defensive cybersecurity strategies and techniques in this insightful presentation from DerbyCon 3.0, offering valuable knowledge for enhancing your security posture.
Explore techniques for patching Windows executables to inject malicious code, including code cave creation, shellcode prototyping, and mitigation strategies against these attacks.
Engaging Q&A session with Jason Scott discussing the Defcon documentary, offering insights into hacker culture and the evolution of the iconic conference.
Explore bug bounty programs' benefits, challenges, and impact on cybersecurity. Learn how to participate effectively and understand their role in modern security practices.
Explore advanced password recovery techniques, modern mitigation strategies, and the importance of multi-factor authentication in enterprise security.
Explore pentesting from a developer's perspective, learning essential techniques and strategies to enhance software security and vulnerability assessment.
Explore malware testing scenarios to enhance network security with insights from Tony Huffman and Juan Corte. Learn practical techniques for identifying and mitigating threats in real-world environments.
Learn to create an effective information security awareness program from the ground up, covering key strategies and best practices for educating and protecting your organization.
Explore Tizen security vulnerabilities and hacking techniques for this emerging mobile OS. Learn about potential risks and defensive strategies for the platform.
Get personalized course recommendations, track subjects and courses with reminders, and more.