Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Introducción a la Ciencia de Datos con Python
Functional Foods and Nutraceuticals
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Dojocon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore peer-to-peer network forensics techniques, uncovering digital evidence and investigating file-sharing activities for cybersecurity and legal purposes.
Explore physical security vulnerabilities and learn effective techniques to protect against unauthorized access in this engaging presentation by security expert Deviant Ollam.
Comprehensive exploration of DDoS attacks, covering techniques, impacts, and defense strategies for cybersecurity professionals and network administrators.
Explore the current state and future prospects of Intrusion Detection Systems (IDS) in cybersecurity, examining their effectiveness and potential obsolescence.
Explore cultural cues from high-risk professions to enhance IT security practices. Learn from aviation, healthcare, and other industries to improve communication, leadership, and safety protocols.
Explore the world of malicious USB devices and their potential as attack vectors. Learn about risks, prevention strategies, and the latest developments in this intriguing area of cybersecurity.
Explore internationalized domain names and their impact on digital investigations, focusing on challenges and strategies for navigating multilingual web addresses.
Learn cost-effective techniques for enterprise-level packet capture. Discover tools and strategies to efficiently monitor network traffic without breaking the bank.
Explore international cyber jurisdiction, discussing "kill switching" cyberspace, cybercrime prosecution, and jurisdiction hopping. Covers legal challenges, data havens, and internet control in a globalized digital world.
Explore current cybersecurity challenges and trends with insights from industry expert Chris Nickerson, addressing critical vulnerabilities and emerging threats in the digital landscape.
Learn to detect and defend networks using Nepenthes/Shaolin tools. Explore advanced cybersecurity techniques for network protection and threat detection in this comprehensive tutorial.
Explore techniques for rapidly compromising Internet Service Provider systems, highlighting vulnerabilities and potential attack vectors in network infrastructure.
Learn techniques for profiling and exploiting targets using social networks, exploring vulnerabilities in online information sharing.
Explore vulnerabilities in printer systems and learn techniques for exploiting them to gain unauthorized access or control over networked devices.
Explore the convergence of security and IT, covering integration, risks, systems, and organizational challenges. Learn about cyber threats, cost considerations, and social engineering in this comprehensive overview.
Get personalized course recommendations, track subjects and courses with reminders, and more.