Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Data Analysis
Microsoft Excel
Artificial Intelligence
An Introduction to Interactive Programming in Python (Part 1)
Excel: Fundamentos y herramientas
The Future of Work: Preparing for Disruption
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from DerbyCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore active defense strategies and the ethics of "hacking back" in cybersecurity, examining legal implications and practical considerations for protecting digital assets.
Explore advanced hacking techniques and ethical penetration testing strategies to enhance cybersecurity defenses and protect against sophisticated cyber threats.
Explore hardware hacking techniques using an RFID badge reader, covering circuit analysis, signal decoding, and practical Arduino-based projects for RFID spoofing and security research.
Explore advanced persistence techniques in cybersecurity, covering methods to maintain unauthorized access and evade detection in compromised systems.
Explore advanced browser pivoting techniques for penetration testing and ethical hacking, presented by expert Raphael Mudge at DerbyCon 3.0.
Explore modern code auditing techniques, challenges, and tools with expert insights on improving software security and vulnerability detection.
Learn strategies for implementing effective security measures in resource-constrained and challenging environments, focusing on practical solutions and innovative approaches.
Learn practical techniques for evading antivirus detection, drawing from real-world experiences and lessons learned in penetration testing and red team engagements.
Explore the intersection of big data and security with insights on privacy, ethics, and risk management in the digital age.
Learn to build your own command and control system for cybersecurity testing, exploring DIY techniques and practical applications in network defense and penetration testing.
Explore IPv6 implementation, its current status, and practical applications in network security and administration.
Explore Android app security through reverse engineering techniques, focusing on Dalvik bytecode analysis and manipulation for enhanced mobile security understanding.
Explore web application security essentials, including browser proxies, HTTP requests, cookies, and common vulnerabilities like XSS and SQL injection. Learn attacker mentality and defense strategies.
Explore the enigmatic world of Mr. Hokum with Jason Scott, delving into intriguing tales and uncovering hidden truths in this captivating presentation.
Explore advanced anti-forensics techniques for memory analysis, focusing on evasion methods and countermeasures in digital investigations.
Get personalized course recommendations, track subjects and courses with reminders, and more.