Courses from 1000+ universities
Coursera’s flagship credentials may carry big brand names, but who’s actually creating the content?
600 Free Google Certifications
Web Development
Cybersecurity
Leadership
What is a Mind?
Technical Report Writing for Engineers
Mathematical Economics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from DefCamp. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore vehicle component penetration testing, focusing on ECUs and FMS. Learn about CAN networks, OBD2 ports, and various hacking tools and techniques for automotive security.
Explore Simjacker, a billion-dollar mobile security threat exploiting SIM card vulnerabilities. Learn about its timeline, attack methods, and implications for old technology in the mobile industry.
Explore the journey of hacking a Honda vehicle, from initial assumptions to uncovering vulnerabilities. Learn about tools, techniques, and insights gained during this ethical hacking process.
Explore AutoHotKey malware, its unpacking, encoding, and exfiltration techniques. Learn about detection rates, ClipBanker, Steam stealing, and compare AutoHotKey with AutoIT in this cybersecurity talk.
Explore the challenges, objectives, and key success factors in establishing a Cyber Security Operations Center. Learn about data aggregation, change management, and incident response strategies.
Explore IDS evasion techniques, network vulnerabilities, and potential solutions in this comprehensive overview of cybersecurity challenges and defensive strategies.
Explore pivoting techniques from Windows to Linux in penetration testing using PuttyRider. Learn session hijacking, architecture, and functions through a practical demonstration.
Explore social engineering tactics and defenses in this talk, covering trust exploitation, corporate espionage, and the human element in cybersecurity. Features insights from Kevin Mitnick.
Explore cybersecurity operations evolution with Gabriel Mihai Tanase at DefCamp 2022. Gain insights into SOC advancements and their impact on modern infosec practices from a KPMG expert.
Explore cloud configuration review as a modern internal penetration testing approach, focusing on its importance, methodologies, and impact on cybersecurity strategies.
Análisis retrospectivo de un ataque cibernético significativo ocurrido en DefCamp 2018, examinando sus consecuencias y lecciones aprendidas un año después.
Explore post-quantum signature models using Verkle Trees, covering quantum computing impacts, cryptographic systems, and novel signature schemes for enhanced cybersecurity.
Explore wiper malware anatomy with CrowdStrike experts. Learn techniques, data handling, kernel drivers, and more in this DefCamp 2022 cybersecurity presentation.
Explore internet fragmentation amid military conflicts, examining global examples, cyber attacks, and potential solutions for a more connected digital world.
Explore the analysis and exploit development for CVE-2022-24086, a critical Magento RCE vulnerability, presented by a security researcher at DefCamp 2022.
Get personalized course recommendations, track subjects and courses with reminders, and more.