Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Psychology
Data Analysis
Digital Marketing
Introduction to Psychology
Nutrition, Exercise and Sports
Computing in Python I: Fundamentals and Procedural Programming
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from nullcon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn about OWASP ModSecurity Core Rule Set, a powerful open-source web application firewall. Discover key features like paranoia levels and anomaly scoring, and see its effectiveness in protecting against various attacks.
Explore the full stack hack of AppleTV3, uncovering vulnerabilities and jailbreaking techniques. Learn tricks for attacking restricted devices and gain insights into iOS security.
Explore techniques for uncovering elusive web vulnerabilities, from advanced methods to overlooked basics. Learn strategies to enhance your security auditing skills and find flaws others miss.
Discover cyber threat intelligence essentials, including analyst skills, frameworks, daily tasks, and maintaining anonymity. Learn to put intelligence into action for effective cybersecurity.
Explore macOS security features, vulnerabilities, and bypass techniques with a Microsoft security expert. Gain insights into SIP, TCC, and potential exploit avenues for researchers and professionals.
Explore the impact of log4j vulnerability, its industry-wide effects, and strategies for mitigating similar threats in 2022 with experts Alvaro Munoz and Joe Slowik.
Explore the Bhadra framework for threat modeling in mobile communication systems, addressing complex security challenges and providing a structured approach to analyze adversarial behaviors in telecom networks.
Comprehensive overview of ransomware, including history, current attacks, hacker groups, and defense strategies. Explores cyber security frameworks and principles for effective recovery and protection.
Hands-on workshop for non-programmers to learn fuzzing techniques. Covers environment setup, tools like AFL and Honggfuzz, instrumentation, input selection, and crash analysis. Suitable for beginners to intermediate level.
Learn strategies for secure migration from on-premise to Azure Cloud, focusing on real-time scenarios, architecture design considerations, and Azure services for seamless transition while addressing security challenges.
Cybersecurity experts discuss operationalizing threat intelligence, moving from reactive to proactive approaches, and addressing challenges in cloud adoption and workforce training for enhanced security.
Explore Android Runtime's evolution, optimization techniques, and structure. Learn to analyze apps by modifying ART to extract real-time information and develop effective analysis techniques without code access.
Explore Azure Sphere IoT security features, vulnerabilities discovered during Microsoft's research challenge, and a privilege escalation chain for acquiring Azure Sphere Capabilities.
Explore 5G telecom security challenges, improvements, and implementation issues. Learn about virtualization risks, DDOS threats, and industry initiatives like NESAS in this comprehensive overview.
Explore the evolution of security research and disclosure, from historical "unbreakable locks" to modern challenges in IoT, blockchain, and AI, with insights on ethical hacking and vulnerability reporting.
Get personalized course recommendations, track subjects and courses with reminders, and more.