Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from nullcon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn to create effective bug bounty reports for quicker responses, better relationships with security teams, and higher bounties. Gain insights from Adam Bacchus's experience at HackerOne, Snapchat, and Google.
Explore advanced XML fuzzing techniques and a new tool for mutating XML documents, with insights from an experienced penetration tester on finding security vulnerabilities in various formats.
Explore vulnerabilities in HL7 2.x healthcare messaging standard, common implementation flaws, and attack techniques. Learn about a tool for quick analysis and testing of medical device security.
Explore HyperPlatform, a thin hypervisor for Windows, enabling flexible handling of system events and rapid implementation of hypervisor-based tools with high compatibility and efficiency using Intel VT-x technology.
Exploring the balance between security and innovation, this talk challenges the notion that more security is always better, examining potential drawbacks and trade-offs in cybersecurity practices.
Explore blockchain's advantages, security concerns, and applications in banking and insurance. Learn about technical recommendations, real-world connections, and practical examples from an experienced IT security consultant.
Panel discussion exploring application security challenges and opportunities in DevOps, featuring insights from industry leaders on integrating security into modern development practices.
Panel discussion exploring India's role in future internet conflicts, featuring cybersecurity experts and government officials debating digital warfare, policy, and national security implications.
Explore iOS jailbreaking techniques, security implications, and the latest developments in mobile device exploitation at this cutting-edge conference talk.
Explore techniques for developing tailored network scans to enhance security in large-scale enterprise environments. Learn practical strategies for identifying vulnerabilities and strengthening defenses.
Explore Tizen OS security vulnerabilities, architecture, and application pentesting. Compare with Android and learn about issues like WebKit2 flaws, buffer overflows, and SSL certificate injection.
Explore POS system architecture, attack vectors, and defense strategies against credit card stealing malware. Includes live demo of RAM scraping malware and mitigation techniques for financial security.
Explore RF retroreflectors: tiny, powerless implants for over-the-air surveillance. Learn how they work, build your own, and understand this modern radar eavesdropping technology revealed in the NSA ANT catalog.
Explore the evolving landscape of cyber space and its implications for security in this insightful talk by K D Nayak at nullcon Goa 2015.
Explore drone technology, communication protocols, and security vulnerabilities. Learn about potential hijacking methods and steps to ensure safe UAV systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.