Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Data Analysis
Microsoft Excel
Artificial Intelligence
An Introduction to Interactive Programming in Python (Part 1)
Excel: Fundamentos y herramientas
The Future of Work: Preparing for Disruption
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from TROOPERS. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore network monitoring and security through SNMP OIDs, focusing on IP-MIB for traffic analysis and threat detection in enterprise environments.
Explore techniques for evading intrusion detection and prevention systems by leveraging unique IPv6 features, enhancing network security knowledge and offensive capabilities.
Explore IPv6 security challenges, including protocol complexity, predictability issues, and the impact of historical networking approaches on modern security requirements.
Explore psychological aspects of security, including human behavior, decision-making, and cognitive biases that impact cybersecurity practices and risk assessment.
Explore anti-forensics techniques for SAP systems, uncovering methods to conceal digital evidence and thwart investigations in enterprise environments.
Explore innovative strategies for safeguarding your digital identity and enhancing password security in this insightful presentation by cybersecurity expert Chema Alonso.
Comprehensive analysis of security risks in hosted SAP environments, exploring vulnerabilities and providing strategies for effective risk mitigation and protection.
Explore OSMOSIS, a security tool for detecting malicious network traffic, presented by Christian Sielaff and Daniel Hauenstein at TROOPERS14 conference.
Explore SAP's network protocols with Martin Gallo, uncovering vulnerabilities and security implications in enterprise systems. Gain insights into potential risks and mitigation strategies.
Explore techniques to bypass anti-virus systems, understanding vulnerabilities and enhancing cybersecurity knowledge for better protection against potential threats.
Explore the creation and vulnerabilities of 802.15.4 Wireless Intrusion Detection Systems, with insights from security experts on implementation and potential weaknesses.
Explore advanced techniques for extracting and analyzing data from smartphones, including cloud-based information and encrypted content. Learn cutting-edge forensic methods for mobile devices.
Explore cloud security vulnerabilities and attack techniques in this comprehensive presentation, focusing on potential risks and defensive strategies for cloud environments.
Explore hidden features and security implications of Adobe Acrobat, uncovering surprising aspects of PDF technology that impact digital document handling and cybersecurity.
Explore application security vulnerabilities and learn techniques to detect and prevent malicious activities in your software systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.