Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Computer Science
Cybersecurity
Max MSP Programming Course: Structuring Interactive Software for Digital Arts
Fundamentals of Neuroscience, Part 1: The Electrical Properties of the Neuron
Psychology of Personal Growth
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from NorthSec. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore imposter syndrome, self-doubt, and personal growth in tech. Learn to embrace uniqueness and overcome negative self-perceptions in this empowering talk.
Explore cryptography fundamentals, encryption methods, and attack techniques in this comprehensive workshop. Learn about hashing, ciphers, and practical approaches to breaking crypto systems.
Explore Unicode vulnerabilities in web applications, including normalization, capitalization misuse, and encoding conversion risks. Learn about HostSplit, HostBond attacks, and Punycode exploitation.
Explore innovative software hardening using typed region-based policies. Learn how to apply this approach to protect against vulnerabilities and enhance system security beyond traditional compiler techniques.
Exploring IOMMU and DMA attacks, focusing on security implications, operating system integration, and techniques to bypass protections, particularly on macOS up to version 10.12.4.
Explore the impact of 3D printing on fingerprint cloning and its security implications for devices. Learn about real-world attack scenarios and the level of sophistication needed to bypass biometric authentication.
Explore quantum-safe cryptography's progress, standardization, and implementation in TLS, SSH, and VPN. Learn to future-proof encrypted data against potential quantum computer decryption.
Explore multi-architecture disassembly techniques, from intuitive strategies to advanced concepts like non-returning calls, type libraries, and identifying library routines.
Explore post-quantum cryptography, its impact on public key systems, and emerging hard problems in lattice-based, multivariate, and code-based cryptography for future security.
Simplifying HTTPS adoption: Learn how Certbot streamlines Let's Encrypt certificate acquisition, enhancing website security and user privacy through improved accessibility and user-friendly design.
Explore safer online dating for queer communities through harm reduction strategies, focusing on user-centric safety, privacy, and security in app design and personal tech choices.
Explore cloud security challenges, attacker strategies, and effective threat hunting techniques in AWS and Azure environments. Learn to protect against and detect sophisticated cloud-based attacks.
Explore ethical obligations in secure coding, data breaches, and developer responsibilities. Gain insights on improving security practices and addressing user privacy concerns.
Unveil mining pool strategies, identify Stratum servers, and explore cryptomining malware detection techniques through static and dynamic analysis, web scraping, and network scanning.
Explore stalkerware and spouseware threats, their impact on victims, and potential solutions. Learn about detection, legal aspects, and the role of tech companies in combating these privacy invasions.
Get personalized course recommendations, track subjects and courses with reminders, and more.