Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Data Analysis
Computer Networking
Medicine and the Arts: Humanising Healthcare
Exploring Play: The Importance of Play in Everyday Life
Songwriting: Writing the Lyrics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from TROOPERS. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore advanced techniques for exploiting vulnerabilities in web applications, focusing on practical demonstrations and real-world scenarios.
Explore SAP GUI vulnerabilities and hacking techniques in this conference talk, focusing on security implications and potential exploits in SAP systems.
Explore web caching vulnerabilities and their exploitation in this technical presentation, covering attack techniques, real-world examples, and defensive strategies.
Learn techniques to evaluate and assess the security of closed source software without access to the source code.
Explore advanced fuzzing techniques to enhance vulnerability detection by incorporating target system knowledge, improving efficiency and effectiveness in security testing.
Humoristische Einblicke in typische Fehler bei IT-Sicherheitsaudits und wie man sie vermeidet. Praktische Tipps für erfolgreiche Audits und verbesserte Cybersicherheit.
Enno Rey's keynote explores innovative approaches to cybersecurity challenges, offering insights on stopping ineffective practices and embracing more effective strategies in the field.
Explore the history and implications of the TLS Authentication Gap Bug with security experts Steve Dispensa and Marsh Ray in this in-depth conference talk.
Explore vulnerabilities in custom SAP ABAP code and learn effective strategies for identifying and mitigating security risks in SAP systems.
Explore BlackBerry security vulnerabilities and potential spying techniques in this eye-opening presentation on mobile device privacy and data protection.
Explore federated identity systems, their potential benefits, and associated risks in this comprehensive talk by Dominick Baier.
Explore virtualization security challenges, benefits, and best practices in this comprehensive overview of virtual environments and their impact on IT infrastructure.
Explore SAP security vulnerabilities, attack vectors, and protection strategies in this comprehensive overview by expert Alexandr Polyakov.
Explore the realities of Web Application Firewalls with experts Sandro Gauci and Wendel Guglielmetti, uncovering insights and truths about their effectiveness and implementation in cybersecurity.
Explore vulnerability testing through a real-world case study, gaining insights into effective security assessment techniques and practical application of testing methodologies.
Get personalized course recommendations, track subjects and courses with reminders, and more.