Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Data Analysis
Computer Science
Financial Markets
CS50's Introduction to Computer Science
Functional Foods and Nutraceuticals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from NahamCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore techniques for reversing Web Assembly (wasm) in this offensive security talk. Learn key strategies and tools for analyzing and understanding wasm code.
Discover effective blackbox monitoring techniques for timely bug detection in web applications. Learn task-based hybrid approaches, freshness indicators, and risk markers for improved security.
Explore techniques for exploiting vulnerabilities in Continuous Integration systems, focusing on security risks and potential attack vectors in the software development pipeline.
Explore cloud wallet vulnerabilities and crypto web app hacking techniques in this talk by @samwcyo, covering blind XSS, SQL injection, and account takeovers in the cryptocurrency ecosystem.
Discover effective techniques for identifying vulnerabilities through source code debugging. Learn to enhance your bug hunting skills and improve your ability to find security flaws in software.
Explore recon fundamentals through practical examples in this offensive security talk. Learn essential techniques for effective reconnaissance in bug bounty and penetration testing.
Explore techniques for finding 0-day vulnerabilities in enterprise web applications, focusing on HCL Digital Experience, Solarwinds Web Help Desk, and Sitecore's Experience Platform.
Comprehensive guide to application analysis for bug hunters, covering advanced techniques, tools, and methodologies to identify vulnerabilities and maximize bounty rewards.
Panel discussion on leveraging bug bounties for career growth, knowledge expansion, and community building in infosec. Experts share insights on how bug bounties have impacted their professional journeys.
Insights into successful bug bounty hunting strategies and experiences over a 12-month period, focusing on mindset, persistence, and effective techniques for finding vulnerabilities.
Explore advanced IIS hacking techniques, including HTTPAPI 2.0 assets, VHost hopping, local file disclosure, and complex XXE vectors. Learn to leverage tools like DNSpy for effective web application security testing.
Practical guide to overcoming initial challenges in bug bounty hunting, covering automation, reconnaissance, common vulnerabilities, and essential hacking skills for beginners.
Overcoming obstacles in hacking enterprise software for bug bounty programs: experiences and advice on tackling third-party vendor products and obtaining trial access.
Learn to use Chromedp in Go for detecting prototype pollution at scale, enhancing your ability to identify and address this client-side security vulnerability efficiently.
Explore web security vulnerabilities and hacking techniques through hands-on demonstrations, focusing on methodology, enumeration, and exploitation of common weaknesses in web applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.