Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Data Analysis
Microsoft Excel
Artificial Intelligence
An Introduction to Interactive Programming in Python (Part 1)
Excel: Fundamentos y herramientas
The Future of Work: Preparing for Disruption
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from TROOPERS. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore hardware security, tamper protection, and building trustworthy electronics. Learn about microcontroller selection, noise sources, and auditable design techniques for enhanced security.
Explore defender economics, attacker motivations, and security challenges. Gain insights into hacker strategies, Chrome's security model, and APT groups to improve defensive decision-making.
Explore RF retroflectors, emission security, and software-defined radio with insights on classified content, NSA tools, and practical experiments in backscatter communication.
Explore critical vulnerabilities in computing foundations and their impact on security. Learn about technical debt, low-level attacks, and strategies to address information security challenges.
Comprehensive guide on securely deploying IPv6, covering infrastructure, automation, addressing, transition techniques, and security measures to prevent common pitfalls and vulnerabilities.
Comprehensive exploration of network infrastructure vulnerabilities and defense strategies, covering SNMP, routing protocols, and encryption to protect enterprise systems against sophisticated attacks.
Explore FinSpy hacking techniques, including version analysis, configuration decryption, and network communication interception, in this detailed cybersecurity case study.
Explore IPv6 implementation in service provider networks, covering architecture, configuration, and security considerations for successful deployment and customer support.
Explore SAP system security, custom code risks, and best practices for protecting critical business systems in this comprehensive overview.
Explore new features of SI6 Networks' IPv6 Toolkit, including automatic address scanning, port scanning, and TCP connection establishment, with expert Fernando Gont.
Learn efficient strategies to protect Active Directory from credential theft and compromise, focusing on authentication, attack methods, and mitigation techniques.
Explore advanced cybersecurity techniques including decapitation attacks, nasty MOV instructions, and the "Dead Hand" concept in this technical deep dive on system vulnerabilities and countermeasures.
Explore USB host driver fuzzing techniques, covering USB basics, security implications, and practical implementation steps for effective vulnerability discovery.
Explore 20 methods to bypass secure boot, including debug access, exploits, timing attacks, glitches, and design flaws. Learn about real-world examples and security implications.
Explore the relationship between privacy and security, challenging common misconceptions and emphasizing their interconnectedness for better overall protection and societal well-being.
Get personalized course recommendations, track subjects and courses with reminders, and more.