Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from GrrCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore strategies to mitigate cloud breaches, including encryption, tokenization, and safe harbor regulations, while enhancing data security and compliance in cloud environments.
Explores challenges and misconceptions of Managed Security Service Providers (MSSPs), offering insights on selection, negotiation, and implementation for businesses considering outsourced security solutions.
Explore gamification techniques for cybersecurity training with John DeRyke. Learn innovative approaches to engage and educate teams through interactive gameplay and simulations.
Learn strategies to prevent data breaches and protect sensitive information. Discover best practices for data security and risk mitigation in this informative presentation.
Entertaining tales of penetration testing mishaps and lessons learned, offering valuable insights for security professionals and aspiring pentesters.
Explore techniques hackers use to bypass AI-enabled endpoint detection, including malware disguises and virtualization isolation. Learn about vulnerability exposure and privileged access management.
Rethinking cybersecurity approaches: Explore innovative strategies, challenge conventional wisdom, and discover effective methods to enhance organizational security posture.
Explore data access rights exploits under new privacy laws, including legal DDoS, fishing tactics, and defense strategies against potential misuse of data subject requests.
Discover cost-effective techniques for host hunting in cybersecurity, exploring efficient methods to identify and analyze network vulnerabilities without breaking the bank.
Learn techniques to create more effective SSH honeypots, analyze attacker behavior, and enhance cybersecurity defenses through practical demonstrations and real-world insights.
Learn essential techniques for reverse engineering malware, from basic concepts to practical analysis methods, suitable for beginners in cybersecurity and malware analysis.
Explore next-gen fuzzing tools for bug fixing and memory corruption exploitation, enhancing your cybersecurity skills and understanding of advanced vulnerability detection techniques.
Candid account of personal failures and lessons learned in cybersecurity, offering valuable insights for professionals to avoid similar pitfalls and improve their career trajectories.
Explore 2019's cybercrime landscape, focusing on nation-state activities and ransomware trends. Gain insights into evolving threats and strategies for enhanced cybersecurity preparedness.
Explore the impact of fear in cybersecurity, its origins, consequences, and strategies to overcome it for improved industry practices and public perception.
Get personalized course recommendations, track subjects and courses with reminders, and more.