Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from LASCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Practical insights on conducting Information Security Risk Assessments for software products, covering methods, tips, and lessons learned to identify and mitigate potential security risks.
Explore securing a Raspberry Pi home monitoring system, covering project considerations, GPIO layout, software installation, connectivity, settings, firewall, and service status.
Explore IoT security vulnerabilities in mobile apps, focusing on common mistakes, attack vectors, and research techniques. Learn to identify and exploit weaknesses in device-to-cloud communication.
Explore ransomware attacks, IoT-based DDoS threats, and their potential combination. Learn analysis techniques, attack stages, and future cybersecurity challenges in this comprehensive overview.
Secure DevOps: Beyond tools, focus on risk assessment, threat modeling, and custom security controls. Learn to integrate security effectively in CI/CD pipelines for robust application protection.
Explore cloud operations at scale, multi-account models, and automated guardrails for security and compliance. Learn to leverage automation tools for efficient cloud management and collaboration.
Exploring cybersecurity challenges for non-profits, this talk offers strategies to protect organizations, donors, and beneficiaries in the digital age, emphasizing unique sector needs and practical solutions.
Learn essential penetration testing techniques, focusing on human vulnerabilities and social engineering in cybersecurity. Explore real-world scenarios and strategies to strengthen organizational security.
Explore vulnerabilities in biometric recognition systems, including mobile authentication, spoofing techniques, and emerging technologies like blockchain, with insights on future developments and security challenges.
Automating security for startups using open-source tools to integrate dependency, code, and infrastructure protection without impeding progress or increasing developer workload.
Learn to identify and prevent application abuse by understanding adversary tactics and implementing effective security architecture in DevOps environments.
Insights on software supply chain practices, revealing vulnerabilities in open source components and strategies for improving application security in high-performance development organizations.
Explore common cryptography pitfalls, modern techniques, and tools to enhance system security. Learn about random number generation, hash functions, ciphers, and authentication protocols.
Explore the evolution and fundamentals of cryptography, from ancient ciphers to modern encryption methods, understanding their strengths and vulnerabilities.
Practical advice on improving physical security, covering common weaknesses, bypass techniques, vulnerability mapping, and cost-effective solutions for modern enterprises.
Get personalized course recommendations, track subjects and courses with reminders, and more.