Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from nullcon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Eva Galperin explores global cybersecurity and privacy challenges, focusing on protecting vulnerable populations. She shares insights from her work at EFF, including malware research and developing privacy training materials.
Explore a centralized logging system for Kubernetes, enabling visualization of intracluster activity and detection of potential security threats through live demonstrations and open-source tools.
Panel discussion on cyber-enabled information operations and their impact on elections, exploring cognitive cyber offense, disinformation campaigns, and the evolving landscape of digital influence in politics.
Insightful talk on adapting to rapid changes in cybersecurity, exploring evolving threats, emerging technologies, and strategies for staying ahead in the ever-changing digital landscape.
Explore the underground world of iPhone unlocking, including phishing kits and tools used by hackers and thieves to bypass Activation Lock, and its controversial connection to iPhone repair and resale.
Explores GNSS vulnerabilities, potential threats to GPS-dependent systems, and countermeasures. Discusses manipulation techniques and their impact on critical infrastructure, offering insights into safeguarding against these risks.
Comprehensive guide to designing secure boot systems for embedded devices, covering vulnerabilities, hardware attacks, and practical recommendations for robust implementation.
Comprehensive overview of global malware trends in 2019, focusing on India and the subcontinent. Explores attack methods, vulnerabilities, and successful malware strategies from basic to advanced threats.
Adam Laurie explores reverse engineering of secure embedded systems in electronic communications, sharing insights from his extensive experience as a security consultant and DEFCON senior staff member.
Explore Andromeda, a GUI-based toolkit for dynamic app analysis. Learn about class enumeration, method hooking, and runtime memory analysis features that enhance mobile security research and penetration testing.
Explore security vulnerabilities in co-working spaces, including unpatched devices, entry systems, and surveillance cameras. Learn about potential risks and the importance of prioritizing cybersecurity in shared workspaces.
Explore factors influencing high-value bug bounty awards with Microsoft's Bug Bounty Program manager, including key strategies for maximizing payouts in cybersecurity research.
French security researcher Robert Baptiste discusses Aadhaar data breaches, responsible disclosure, and collaborating with governments to address security issues in this insightful interview at nullcon Goa 2019.
Explore DDoS attack trends, attacker motivations, and defense strategies. Learn effective mitigation practices to protect your organization from disruptive cyber threats.
Learn to set up an IoT testing lab with affordable tools, debunk common misconceptions, and gain insights into IoT pentesting from an experienced security researcher.
Get personalized course recommendations, track subjects and courses with reminders, and more.