Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Hack in Paris. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore pvefindaddr plugin for Immunity Debugger, automating Win32 exploit development tasks. Preview Project Quebec's optimizations and new features for enhanced performance.
Innovative approach to prevent XSS attacks using ECMA Script 5 features, sealing DOM properties and creating client-side IDS/IPS systems for modern browsers.
Explores the challenges of cybersecurity in the era of smartphones, discussing potential threats, government responses, and the need for new defense strategies against mobile-based attacks.
Engaging panel discussion featuring cybersecurity experts exploring defensive strategies and the nature of digital threats in today's interconnected world.
Explore XML security vulnerabilities, from browsers to enterprise solutions. Learn about DTD, SVG, XSLT, XPath, and XML databases, with practical examples and PoC code.
Explore cybersecurity's past, present, and future with Mikko Hypponen. Delve into malware evolution, criminal tactics, governmental attacks, and emerging threats in this insightful keynote address.
Discover sophisticated browser attacks that bypass traditional security measures, stealing sensitive data without using scripts. Learn about markup-based techniques that evade common protections.
Exploring HTML5's security vulnerabilities and advanced UI-Redressing techniques, demonstrating how attackers can exploit seemingly minor flaws in web applications for malicious purposes.
Análisis detallado de Stuxnet y Flame como armas cibernéticas avanzadas, su impacto en la seguridad estatal y las implicaciones para futuros conflictos cibernéticos.
Strategies for effective cybersecurity communication: engaging management, empowering employees, and fostering industry collaboration to create a more secure digital environment.
Explore techniques to bypass Android's permission model, including exploiting insecure storage and interfaces. Learn about security risks and mitigation strategies for developers and users.
Comprehensive security assessment of IPv6 protocol suite, highlighting vulnerabilities, implementation challenges, and best practices for secure deployment in modern networks.
Explore the intricacies and limits of the PE format, uncovering its peculiarities and pushing boundaries in this detailed examination of file structure weirdness.
Explore embedded device security, unconventional malware, reverse engineering, and offensive technologies in this comprehensive examination of cybersecurity challenges and techniques.
Explore quantum technology's impact on cybersecurity, including risks to cryptography and strategies for preparedness. Learn about quantum computing, QKD, post-quantum cryptography, and potential security benefits.
Get personalized course recommendations, track subjects and courses with reminders, and more.