Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Data Analysis
Microsoft Excel
Artificial Intelligence
An Introduction to Interactive Programming in Python (Part 1)
Excel: Fundamentos y herramientas
The Future of Work: Preparing for Disruption
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from TROOPERS. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore the potential security risks of QR codes as attack vectors, uncovering vulnerabilities and discussing strategies to mitigate threats in mobile and web environments.
Explore IP-based surveillance camera vulnerabilities and exploitation techniques, focusing on network protocols, firmware analysis, and practical attack demonstrations.
Explore the potential dangers and security risks associated with interconnected devices in the modern world.
Explore a versatile cybersecurity tool that streamlines various tasks, enhancing efficiency and effectiveness in digital defense strategies.
Explore the Chimaera Processor's principles, history, and architectures, including Tandem Cyclone and verification systems.
Explore cloud security vulnerabilities and learn effective strategies for identifying and mitigating hidden threats in cloud environments.
Explore vulnerabilities in industrial robots, uncovering potential security risks and attack vectors. Learn about the implications for safety and productivity in automated manufacturing environments.
Explore yacht cybersecurity vulnerabilities and hacking techniques in this talk on maritime IoT threats, offering insights for securing connected vessels.
Explore IPv6 implementation challenges in cloud environments, addressing potential setbacks and strategies for successful deployment in modern network infrastructures.
Explore IPv6 address management strategies and lessons learned over five years, covering challenges, best practices, and future considerations for network administrators and security professionals.
Explore MIPS and MIPS16 architecture quirks, focusing on delay slots and their impact on emulation. Learn techniques to frustrate reverse engineering efforts in embedded systems.
Explore challenges in securing next-generation wearables, focusing on in-ear fitness coaches. Learn about potential vulnerabilities and strategies for hardening these innovative IoT devices.
Explore cutting-edge techniques for IPv6 network reconnaissance, focusing on recent advancements and their implications for security professionals and network administrators.
Explore JSON injection vulnerabilities in modern password recovery systems, uncovering potential security risks and learning effective mitigation strategies.
Explore techniques for uncovering cryptographic vulnerabilities in SAP systems, enhancing security awareness and protection strategies for enterprise software environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.