Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from NorthSec. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore load balancer architecture, deployment, and post-breach access. Learn to navigate systems, avoid detection, and exploit configurations across various platforms for enhanced network control.
Explore RDP security risks, attacks, and mitigation strategies. Learn to deploy secure RDP servers and detect potential threats in Windows remote environments.
Explore authentication challenges in SaaS integration and cloud transformation, focusing on security pitfalls, unmanaged cloud identities, and the importance of cloud-based Identity Provider solutions.
Explore the process of designing, developing, and launching an open-source CAN bus tool. Learn about PCB design, driver development, and the challenges of bringing hardware products to market.
Unmasking cybercriminals' sophisticated techniques for account takeover attacks, focusing on machine fingerprint markets, their impact on Canadians, and strategies for protection against this growing threat.
Explore advanced device profiling bypass techniques using DHCP packet manipulation for Network Access Control systems. Learn about implementation, mechanics, and risk mitigation strategies.
Exploring coordinated vulnerability disclosure in Canada's federal government, highlighting gaps and recommending policy frameworks to enhance cybersecurity and protect security researchers.
Explore critical vulnerabilities in network equipment, from routers to firewalls. Learn about common patterns, historical context, and future trends in cybersecurity for these essential devices.
Explore AMITT framework updates for combating disinformation, including new countermeasures. Learn about recent events and practical applications in influence operations defense.
Analyse de l'utilisation malveillante des médias sociaux pendant l'élection fédérale canadienne de 2019, examinant le rôle des bots sociaux dans la manipulation du discours politique et la désinformation.
Exploring the tension between privacy and monopoly in tech, advocating for interoperability as a solution to enhance security without compromising user rights or enabling corporate dominance.
Explore GraphQL security: attack vectors, defense strategies, and hands-on learning with the Damn Vulnerable GraphQL Application. Gain insights into protecting this emerging API technology.
Explore 'repo jacking', a widespread supply chain vulnerability affecting 70,000+ open-source projects. Learn its causes, exploitation methods, and mitigation strategies to protect your GitHub-dependent projects.
Explore cryptographic best practices, common pitfalls, and secure implementations for random number generation, encryption, hashing, and more. Essential knowledge for designing and auditing cryptographic systems.
Explore imposter syndrome, self-doubt, and personal growth in tech. Learn to embrace uniqueness and overcome negative self-perceptions in this empowering talk.
Get personalized course recommendations, track subjects and courses with reminders, and more.