Courses from 1000+ universities
The future of Coursera’s only credible alternative for universities rests in the hands of 2U’s creditors.
600 Free Google Certifications
Communication Skills
Project Management
Language Learning
FinTech Ethics and Risks
Mining Massive Datasets
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from ShmooCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Overview of post-quantum cryptography and its practical applications in securing today's data against future quantum threats. Includes lessons from real-world integrations and demonstrations of quantum-safe alternatives.
Examination of persistent encryption failures in law enforcement radio systems, exploring protocol vulnerabilities, implementation issues, and challenges in improving security practices for deployed systems.
Explore ethical considerations in offensive security campaigns, including impacts on company morale, deception tactics, and maintaining professional integrity. Learn best practices for conducting ethical red team engagements.
Strategies for bridging the gap between InfoSec job seekers and employers. Insights on challenges, tactics for success, and collaboration in the cybersecurity job market.
Explore the latest tricks used by online scammers and learn three crucial OpSec strategies to protect yourself in an increasingly hostile digital environment.
Explore the hidden offensive capabilities of Vim for red team engagements. Learn how this popular text editor can be leveraged as a powerful tool in unconventional security operations.
Presentation of data from analysis of 6000+ firmware images, revealing trends in software hardening and a critical flaw in Linux/MIPS stack affecting security across embedded devices.
Explores how traditional security measures fail victims of domestic violence and the need to rethink security approaches for vulnerable populations facing proximity-based threats.
Explore electronic voting system vulnerabilities, their exploitation in 2018, and prospects for improvement before 2020 with cybersecurity expert Matt Blaze.
Dive into mainframe security with an analysis of DeFeNeStRaTe.C, exploring privilege escalation, APF unix programs, buffer overflows, and ACEE manipulation on IBM z/OS systems.
Insightful interviews with security industry leaders discussing career journeys, formative experiences, and contemporary issues, blending professional insights with lighthearted banter.
Explore IoT device safety regulations, the Consumer Product Safety Commission's role, and how to report unsafe products. Learn to be an IoT safety advocate with insights from experts.
Explore WhiteRabbit, an open-source tool for tracking ransomware payments on Bitcoin's public ledger. Learn to leverage blockchain data for threat intelligence and cybersecurity investigations.
Explore techniques for patching and securing Linux kernels on IoT devices without source code. Learn to inspect, compile, and apply patches to vendor OEM kernels for vulnerability mitigation and reverse engineering.
Explore real-world cyberattacks on journalists and learn effective tools for protecting press freedom. Gain insights on digital security measures for at-risk media professionals.
Get personalized course recommendations, track subjects and courses with reminders, and more.