Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Web Development
Food as Medicine
Introduction to Animal Behaviour
ANIMATIONs
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from NorthSec. Dive deep into the latest insights, research, and trends from the world's leading experts.
Eleanor Saitta explores advanced security thinking, focusing on patterns, system-wide approaches, and human factors. She discusses key concepts like resource conflicts, intuition, vulnerabilities, and adaptive capacity for effective security practices.
Explore the psychology of phishing, analyze real-world attacks, and learn evidence-based prevention techniques. Discover how to protect against credential theft and evaluate the effectiveness of phishing training.
Explore dynamic .NET implants for red teams, focusing on flexible retooling, OpSec, and overcoming static defenses using DLRium Managed Execution toolkit.
Explore brain-computer interfaces, their current capabilities, and future implications. Delve into neurotechnology's potential, security concerns, and societal impact as we approach a cyberpunk reality.
Demystifying elliptic curve cryptography: explore its applications in HTTPS, Bitcoin, and beyond. Learn about point addition, ECDH, digital signatures, and post-quantum algorithms without deep mathematical knowledge.
Exploits in wetware: social engineering techniques, OSINT strategies, and defensive measures against human vulnerabilities in cybersecurity, based on real-world experiences.
Explore native hooking on Android emulators, understanding process start routines and emulation strategies. Learn why existing frameworks fail and how to create one that works for game cheating.
Analyze hundreds of data breach disclosures to understand common vulnerabilities, focusing on preventable issues like patching and configuration failures, and their impact on enterprises.
Explore diverse malware implementations within techniques, analyze tool differences, and learn to build resilient detection rules by modeling procedures and evaluating similarities.
Essential insights for effective incident response, covering crucial aspects often overlooked by beginners. Learn from real-world experiences to enhance your preparedness and decision-making during critical cybersecurity events.
Explore nation-state techniques for breaching air-gapped networks, analyzing similarities across frameworks and providing practical advice to enhance security and detect potential attacks.
Hands-on workshop exploring real-world cryptographic vulnerabilities. Implement attacks using provided tools, gaining practical experience in identifying and understanding common cryptographic weaknesses.
Leveraging DevOps principles to streamline malware analysis, automate lab setup, and enhance collaboration among security researchers for more efficient threat detection and response.
Explore CANtact, an open-source tool for automotive network analysis. Learn to view, decode, and manipulate CAN traffic for reverse engineering and security testing of vehicle systems.
Explore the factors that prevented Anonymous from being labeled as cyberterrorists, despite their global political activism and masked identity. Gain insights into the complex dynamics of digital activism and cybersecurity rhetoric.
Get personalized course recommendations, track subjects and courses with reminders, and more.