Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Computer Science
Cybersecurity
Max MSP Programming Course: Structuring Interactive Software for Digital Arts
Fundamentals of Neuroscience, Part 1: The Electrical Properties of the Neuron
Psychology of Personal Growth
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from ShmooCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Exploring innovative strategies to address the cybersecurity skills shortage by leveraging diverse talents and creating a sustainable workforce pipeline, inspired by first responder models.
EFF's mission to encrypt the entire Internet, focusing on STARTTLS Everywhere project for secure mailserver communication. Discusses progress, challenges, and future plans for comprehensive online privacy and security.
Explore advanced malware attribution techniques using the Rich Header, including its generation, fingerprinting capabilities, and a novel metadata hash for large-scale sample detection.
Explore the development of a nation-state's cyber surveillance program, including vendor interactions, in-house development, and operational insights for desktop and mobile platforms.
Explore Office 365 security through real-world attack case studies. Learn investigation techniques, log analysis, and defense strategies to protect cloud-based enterprise environments.
Explore hardware security threats, detection methods, and threat modeling with minimal equipment. Learn to identify unexpected features and understand the challenges of hardware implants and interdiction.
Exploring similarities between hacking and special operations communities, focusing on mentoring challenges, professional development, and lessons for mutual understanding in developing intelligent deviants.
Explore DuckDuckGo's innovative privacy-protecting techniques: NGiNX proxying, SSL connection upgrades, and anonymous A/B testing. Learn how to implement these strategies in your own projects.
Exploring cybersecurity challenges in emerging technologies and the need for proactive measures to safeguard our interconnected future, emphasizing collective knowledge and action over grand initiatives.
Explore CAN bus vulnerabilities and CANT software for automotive security research. Learn error handling, selective attacks, and advanced techniques for vehicle hacking and defense.
Methodology for detecting automated behavior in cyber logs using temporal pattern matching, scalable through locality sensitive hashing. Applications include anomaly detection and data fusion.
Explore modern pseudo-Doppler direction finding using SDR for locating radio devices. Learn about innovative techniques, challenges, and future developments in wireless security research.
Uncover bot-driven FCC net neutrality comments using open-source analytics. Learn how data analysis revealed stark differences between bulk API submissions and individual website comments, exposing potential manipulation of public opinion.
Explore CVE-2013-5576 to enhance vulnerability hunting and exploit creation skills. Learn strategies for critical thinking and pattern recognition in cybersecurity.
Explore advanced techniques for securing firmware in large-scale hardware deployments, addressing challenges and future trends in protecting against persistent backdoors and exploits.
Get personalized course recommendations, track subjects and courses with reminders, and more.