Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from TROOPERS. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore strategies for achieving pharmaceutical compliance in cloud computing environments, addressing regulatory challenges and best practices for data security and integrity.
Explore techniques for extracting NTHashes from Azure AD, uncovering potential security vulnerabilities in cloud identity management systems.
Explore coercion techniques in Windows environments, their impact on IT security, and strategies for defense against these powerful attack vectors.
Explore effective prioritization strategies for IT security actions in this insightful conference talk by Mars Cheng and Dexter Chen at TROOPERS23.
Explore Windows Hello vulnerabilities and attack techniques in this IT security talk, covering biometric authentication weaknesses and potential exploits in Windows systems.
Explore hidden network pathways and security vulnerabilities in IT infrastructures with experts Jonas Bülow Knudsen and Alexander Schmitt at the TROOPERS23 conference in Heidelberg.
Explore reconnecting Active Directory with Azure AD after forest recovery, addressing challenges and best practices for seamless integration in hybrid environments.
Explore Windows telemetry's inner workings, data collection methods, and security implications in this advanced IT security talk. Gain insights to enhance system privacy and protection.
Explore techniques for testing and fuzzing Kubernetes admission configurations to enhance security and identify vulnerabilities in container orchestration systems.
Explore SAP's Remote Function Call (RFC) protocol: its functionality, security implications, and potential vulnerabilities. Gain insights for better understanding and securing SAP systems.
Explore GPT-like pre-training on system logs for enhanced malware detection. Learn innovative techniques to leverage unlabeled data and improve cybersecurity defenses against evolving threats.
Explore cloud security with Sapir Federovsky's talk on Reportly at TROOPERS23, focusing on innovative approaches to maintain vigilance in cloud environments.
Explore homophonic collisions in IT security with Justin Ibarra and Reagan Short. Gain insights into this unique aspect of cybersecurity from experts at a leading conference.
Explore OAuth security enhancements and Proof of Possession techniques for improved authentication and authorization in modern applications.
Explore detection and blocking techniques using BPF and YAML for enhanced IT security. Learn innovative approaches to protect systems and networks effectively.
Get personalized course recommendations, track subjects and courses with reminders, and more.