Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from nullcon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore vulnerabilities in macOS antivirus software through XPC exploitation, uncovering security flaws and providing guidance for developers to create secure XPC services.
Explore evolving enterprise security architecture beyond traditional layered defense, addressing modern challenges like advanced hacking, cloud adoption, and remote work to enhance organizational cybersecurity.
Comprehensive workshop on extracting data from damaged Android devices, covering soldering, retrieval of device information, and extraction of various data types for forensic analysis.
Explore machine learning for real-time intrusion detection in cybersecurity. Learn to build a system using AI techniques, featuring insights from Google's Lead Security Engineer Varun Kohli.
Explore WebRTC vulnerabilities in Android messaging apps, their exploitation, and mitigation strategies. Learn about security research techniques and mobile application security.
Explore automated threat intelligence for proactive cybersecurity. Learn to collect, analyze, and share actionable insights in real-time, enhancing organizational defense against evolving threats.
Explore novel ransomware techniques, including virtual machine deployment for attacks. Learn about attacker strategies, detection methods, and cybersecurity insights from a malware specialist.
Explore hardware security vulnerabilities in smart energy meters, covering threat classifications, current trends, and testing methodologies for advanced metering infrastructure and grid security.
Explore ICS/OT security compliance beyond vulnerability assessment. Learn to build a comprehensive security program integrating external and internal regulations for critical industrial environments.
Explore cybersecurity insurance essentials, including policy components, data elements for risk assessment, and key security controls. Learn to determine appropriate coverage and understand industry standards.
Explore industrial cybersecurity, ICS threats, and resilience strategies using ISA-62443. Learn to assess and protect critical infrastructure from cyber attacks in the Energy, Resources, and Industrials sector.
Exploring cyber-physical security beyond fear-mongering, this talk examines root causes of vulnerabilities and proposes better approaches to embed security analysis in system design.
Explore deep learning applications in cybersecurity, including use cases, data pipelines, algorithms, and real-world deployment challenges. Learn how AI can combat ransomware and other cyber threats.
Exploración detallada de la explotación del heap XNU, analizando dos vulnerabilidades del kernel y tres exploits. Cubre internos de XNU, técnicas de explotación y cambios entre versiones de iOS.
Exploring checkm8 vulnerability in iOS SecureROM, its exploitation for jailbreaking, and updates on pongoOS development. Insights into cross-platform challenges and future plans for iOS security research.
Get personalized course recommendations, track subjects and courses with reminders, and more.