Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Introducción a la Ciencia de Datos con Python
Functional Foods and Nutraceuticals
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from NahamCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Exploring advanced techniques for exploiting Microsoft IIS short file name disclosure vulnerabilities, with insights on enhancing web application security and ethical hacking strategies.
Explore PCI DSS compliance challenges and solutions in this informative talk. Gain insights into common issues, best practices, and strategies for effective implementation in your organization's payment card security.
Unveiling effective strategies for bug bounty programs, including common misconceptions, examples, and techniques like back matrixing to maximize success in the first 30 minutes.
Explore new insights into leaked secrets with Forager, a tool for uncovering sensitive information. Learn about its capabilities and implications for cybersecurity and ethical hacking.
Explore techniques for hacking root EPP servers to gain control of DNS zones. Learn about vulnerabilities in domain registry systems and potential impact on internet infrastructure.
Explore strategies for securing open-source dependencies in software development, emphasizing the importance of comprehensive security beyond just your own code.
Exploring the impact of GPT-based AI on security, this talk discusses potential disruptions, challenges, and opportunities in the cybersecurity landscape as AI technology advances.
Explore Shodan's capabilities for identifying critical vulnerabilities in systems. Learn effective techniques to leverage this powerful search engine for enhanced cybersecurity and vulnerability assessment.
Learn effective techniques for exploiting APIs to secure your first valid bug bounty submission, focusing on practical strategies and insider tips for successful API hacking.
Explore techniques for reversing Web Assembly (wasm) in this offensive security talk. Learn key strategies and tools for analyzing and understanding wasm code.
Discover effective blackbox monitoring techniques for timely bug detection in web applications. Learn task-based hybrid approaches, freshness indicators, and risk markers for improved security.
Explore techniques for exploiting vulnerabilities in Continuous Integration systems, focusing on security risks and potential attack vectors in the software development pipeline.
Explore cloud wallet vulnerabilities and crypto web app hacking techniques in this talk by @samwcyo, covering blind XSS, SQL injection, and account takeovers in the cryptocurrency ecosystem.
Discover effective techniques for identifying vulnerabilities through source code debugging. Learn to enhance your bug hunting skills and improve your ability to find security flaws in software.
Explore recon fundamentals through practical examples in this offensive security talk. Learn essential techniques for effective reconnaissance in bug bounty and penetration testing.
Get personalized course recommendations, track subjects and courses with reminders, and more.