Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from nullcon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn secure coding practices for embedded systems in content protection and mobile payments, focusing on real-world asset protection techniques and best practices for software security.
Explore global perspectives on cybersecurity and privacy with Eva Galperin, addressing current challenges and future implications for digital safety and personal data protection.
Explore a whitelist-based browser technique for zero-hour phishing protection, complementing traditional blacklist approaches in the ongoing arms race against phishing attacks.
Explore mobile app security flaws in government-developed applications, uncovering overlooked vulnerabilities and their potential impacts on user privacy and data protection.
Comparative study of Xtensa architecture for IoT devices, exploring differences from ARM for security researchers. Covers assembly instructions, security mechanisms, gadget searching, and post-boot persistence techniques.
Explore the KRACK attack against WPA2, learning how it exploits key reinstallation to compromise Wi-Fi network security. Gain insights into vulnerabilities in protected Wi-Fi handshakes.
Explore the complex interplay between privacy and surveillance in the digital age, examining current challenges and potential implications for individuals and society.
Explore the security risks and vulnerabilities of Internet of Things devices, comparing their challenges to those faced by teenagers in a digital world.
Explore DARWIN, a covert wireless network that exploits existing wireless infrastructure for mischievous purposes. Learn about its adaptive and resilient features in this intriguing presentation.
Explore mobile bootloader security, Chain of Trust, and potential vulnerabilities in device integrity verification processes. Learn about BootStomp's approach to analyzing bootloader security risks.
Explore game theory and AI in cybersecurity, focusing on adversary-defender dynamics, tactics, and the role of AI-powered tools in enhancing defensive strategies and visibility.
Explore cyber risk management strategies in connected environments through expert panel insights on emerging threats, best practices, and industry trends.
Expert panel discusses current forensic challenges and future developments in cybersecurity, featuring insights from law enforcement, security firms, and government agencies.
Expert panel discusses IoT security challenges, potential risks, and future implications, exploring the timeline for widespread IoT vulnerabilities and their impact on various industries.
Expert panel discusses future trends and advancements in cybersecurity operations centers, exploring innovative strategies and technologies to enhance threat detection and response capabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.