Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from TROOPERS. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore strategies for achieving pharmaceutical compliance in cloud computing environments, addressing regulatory challenges and best practices for data security and integrity.
Explore architecture-independent techniques for uncovering software vulnerabilities, enhancing your ability to identify and mitigate security risks across diverse systems.
Efficiently assess Active Directories at any scale using proven techniques and tools for comprehensive security evaluations and vulnerability detection.
Learn to conduct automotive penetration testing using Scapy, enhancing your skills in identifying and exploiting vulnerabilities in vehicle networks and systems.
Explore the inner workings of machines in this insightful keynote, delving into technological intricacies and their implications for cybersecurity and digital innovation.
Explore recent IPv6 developments from IETF, including protocol updates, security enhancements, and implementation strategies for network professionals and enthusiasts.
Explore the intricacies, challenges, and entertaining aspects of VDSL technology in this engaging presentation on modern telecommunications infrastructure.
Explore the latest features and capabilities of SI6 IPv6 Toolkit v3.0 for network security testing and IPv6 protocol analysis.
Explore the intricacies and potential security implications of IPv6, the next-generation Internet Protocol, in this comprehensive technical analysis.
Explore the intricacies and hidden capabilities of MS Office file formats, uncovering potential vulnerabilities and advanced techniques for manipulation.
Explore ethical considerations for security professionals, focusing on practical decision-making frameworks and real-world scenarios to navigate complex moral dilemmas in the field.
Explore common vulnerabilities in encrypted VoIP systems, focusing on SIP-over-TLS and sRTP protocols. Learn to identify and mitigate security risks in voice communication networks.
Explore the evolution of IoT botnets, focusing on Torii and smart-home vulnerabilities. Gain insights into emerging threats and security implications for connected devices.
Explore the development and advancements of kernel fuzzers in NetBSD, focusing on techniques for identifying vulnerabilities and improving system security.
Explore techniques for escalating privileges on macOS using seemingly harmless App Store applications, uncovering potential security vulnerabilities in the operating system.
Get personalized course recommendations, track subjects and courses with reminders, and more.