Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from TROOPERS. Dive deep into the latest insights, research, and trends from the world's leading experts.
Forensic analysis techniques for investigating security incidents within Microsoft Remote Desktop Services, based on real-world case studies and practical insights.
Explore real-world cybersecurity challenges in the automotive sector through shocking case studies, revealing vulnerabilities and lessons learned for improved vehicle safety and data protection.
Explore telecom espionage tactics and vulnerabilities in this IT security talk, uncovering threats to communication networks and discussing protective measures.
Explore vulnerabilities in TPM 2.0 reference implementation with Francisco Falcon. Gain insights into IT security risks and potential exploits in this critical component.
Explore advanced techniques for obfuscating Android apps using native code, enhancing security and protecting intellectual property in mobile app development.
Explore application security vulnerabilities and learn techniques to detect and prevent malicious activities in your software systems.
Explore advanced techniques for exploiting vulnerabilities in web applications, focusing on practical demonstrations and real-world scenarios.
Explore SAP GUI vulnerabilities and hacking techniques in this conference talk, focusing on security implications and potential exploits in SAP systems.
Explore web caching vulnerabilities and their exploitation in this technical presentation, covering attack techniques, real-world examples, and defensive strategies.
Learn techniques to evaluate and assess the security of closed source software without access to the source code.
Explore advanced fuzzing techniques to enhance vulnerability detection by incorporating target system knowledge, improving efficiency and effectiveness in security testing.
Humoristische Einblicke in typische Fehler bei IT-Sicherheitsaudits und wie man sie vermeidet. Praktische Tipps für erfolgreiche Audits und verbesserte Cybersicherheit.
Enno Rey's keynote explores innovative approaches to cybersecurity challenges, offering insights on stopping ineffective practices and embracing more effective strategies in the field.
Explore the history and implications of the TLS Authentication Gap Bug with security experts Steve Dispensa and Marsh Ray in this in-depth conference talk.
Explore vulnerabilities in custom SAP ABAP code and learn effective strategies for identifying and mitigating security risks in SAP systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.