Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from TROOPERS. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore BlackBerry security vulnerabilities and potential spying techniques in this eye-opening presentation on mobile device privacy and data protection.
Explore federated identity systems, their potential benefits, and associated risks in this comprehensive talk by Dominick Baier.
Explore virtualization security challenges, benefits, and best practices in this comprehensive overview of virtual environments and their impact on IT infrastructure.
Explore SAP security vulnerabilities, attack vectors, and protection strategies in this comprehensive overview by expert Alexandr Polyakov.
Explore the realities of Web Application Firewalls with experts Sandro Gauci and Wendel Guglielmetti, uncovering insights and truths about their effectiveness and implementation in cybersecurity.
Explore vulnerability testing through a real-world case study, gaining insights into effective security assessment techniques and practical application of testing methodologies.
Explore pitfalls in vulnerability rating and discover ERRS, a new approach for more accurate assessment and prioritization of security risks in complex environments.
Explore large-scale DoS attacks, mitigation strategies, and best practices for cybersecurity professionals. Learn about attack types, tools, and effective countermeasures.
Explore SAP Forensics techniques for detecting and investigating white-collar cybercrime in enterprise systems, enhancing your ability to secure critical business data and processes.
Explore techniques for hacking and defending major databases, focusing on vulnerabilities, attack methods, and essential security measures for database administrators and security professionals.
Explore USB security vulnerabilities, device emulation, and exploitation techniques across operating systems. Learn to identify and mitigate risks associated with USB ports and devices.
Explore vulnerabilities in Smart TV security and learn about potential exploits and protection strategies for connected television systems.
Explore OAuth2 protocol's security implications, implementation challenges, and best practices for secure authentication and authorization in modern web applications.
Exploración de la tensión entre hackers y ciberguerra, analizando sus implicaciones éticas y técnicas en la seguridad informática moderna.
Explore vulnerabilities in SAP systems and learn advanced techniques for detecting and exploiting security flaws in ABAP code and SAP applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.