Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from NahamCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore techniques for attacking wide-scope targets in bug bounty programs. Learn strategies to identify vulnerabilities and maximize your impact when dealing with extensive attack surfaces.
Insights from a year of triaging bug bounty reports, covering key lessons learned, common pitfalls, and effective strategies for successful vulnerability reporting and management.
Explore the similarities and differences between pentesting and bug bounty hunting, and learn how bug bounty experience can launch a career in pentesting. Gain insights from Phillip Wylie's expertise in cybersecurity.
Explore advanced techniques for integrating diverse data sources into the amass engine, enhancing its capabilities as a comprehensive reconnaissance tool for cybersecurity professionals.
Panel discussion exploring the importance of hacker communities, featuring insights from industry experts on fostering collaboration, knowledge sharing, and growth within the cybersecurity field.
Insights on crafting effective bug reports for quicker triage, based on experience as a triager. Learn to improve your reporting skills and expedite the bug bounty process.
Explore JWT vulnerabilities related to jku and x5u headers, understanding potential security risks and exploitation techniques in web applications.
Explore techniques for reversing Web Assembly (wasm) in this offensive security talk. Learn key strategies and tools for analyzing and understanding wasm code.
Discover effective blackbox monitoring techniques for timely bug detection in web applications. Learn task-based hybrid approaches, freshness indicators, and risk markers for improved security.
Explore techniques for exploiting vulnerabilities in Continuous Integration systems, focusing on security risks and potential attack vectors in the software development pipeline.
Explore cloud wallet vulnerabilities and crypto web app hacking techniques in this talk by @samwcyo, covering blind XSS, SQL injection, and account takeovers in the cryptocurrency ecosystem.
Discover effective techniques for identifying vulnerabilities through source code debugging. Learn to enhance your bug hunting skills and improve your ability to find security flaws in software.
Explore recon fundamentals through practical examples in this offensive security talk. Learn essential techniques for effective reconnaissance in bug bounty and penetration testing.
Explore techniques for finding 0-day vulnerabilities in enterprise web applications, focusing on HCL Digital Experience, Solarwinds Web Help Desk, and Sitecore's Experience Platform.
Comprehensive guide to application analysis for bug hunters, covering advanced techniques, tools, and methodologies to identify vulnerabilities and maximize bounty rewards.
Get personalized course recommendations, track subjects and courses with reminders, and more.