Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from DerbyCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Comprehensive guide on establishing a credit union, covering legal requirements, financial considerations, and operational challenges for aspiring founders in the financial sector.
Explore enterprise security intelligence operationalization, from demonstrating value to real-time implementation, utilizing internal and external sources for effective threat analysis and strategic decision-making.
Discover strategies for navigating the cybersecurity job market, crafting effective résumés, and decoding job descriptions to land your ideal position in this industry-focused talk.
Discover a comprehensive process for identifying advanced malware using the Malware Management Framework. Learn about key components, tools, and practical steps for effective malware detection and management.
Explore vulnerabilities, botnets, and detection methods in the Internet of Things, uncovering potential risks and security challenges in connected devices.
Explore SQL injection techniques using SQLMap, a powerful penetration testing tool, to identify and exploit database vulnerabilities in web applications.
Quantifying advanced malware through data analysis, focusing on finding patterns in large datasets to identify threats and improve detection methods.
Explore antivirus evasion techniques using antigenic variation, challenging traditional blacklisting approaches in cybersecurity and malware detection.
Explore vulnerabilities in next-gen air traffic control systems, examining potential security risks and implications for aviation safety and cybersecurity.
Applying Zombieland survival rules to IT security: practical, humorous tips for staying safe in the digital apocalypse.
Explore Android 4.0 Ice Cream Sandwich's security features, vulnerabilities, and exploitation techniques in this comprehensive analysis of the mobile operating system.
Explore Windows vulnerabilities and default security flaws with expert Mark Baggett. Learn essential techniques for identifying and mitigating risks in Windows systems.
Explore practical file format fuzzing techniques to uncover vulnerabilities and enhance software security. Learn effective strategies for identifying and exploiting weaknesses in file parsing systems.
Explore system calls in Windows and Linux, understanding their role in security and exploitation. Learn techniques for analyzing and manipulating syscalls to enhance your cybersecurity skills.
Explore hacking techniques and strategies with renowned security expert Johnny Long in this engaging DerbyCon presentation on ethical hacking and cybersecurity.
Get personalized course recommendations, track subjects and courses with reminders, and more.