Courses from 1000+ universities
Coursera’s flagship credentials may carry big brand names, but who’s actually creating the content?
600 Free Google Certifications
Artificial Intelligence
Digital Marketing
Leadership
Crisis Resource Management
Critical Thinking at University: An Introduction
Introducción a la gestión de proyectos
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from nullcon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Expert panel discusses key components of effective cybersecurity strategies, offering insights on comprehensive approaches to protect organizations from evolving threats and vulnerabilities.
Uncover how gaming keyboard software can lead to kernel vulnerabilities, exploring real-world exploits and discussing future implications for Linux kernel security.
Explore buffer overflow vulnerabilities in exception handling, uncovering a new exploitation technique and its real-world implications for software security.
Expert panel discusses challenges and strategies for securing autonomous vehicles, addressing cybersecurity risks and safety concerns in the evolving automotive industry.
Explore secure remote operations, analyzing pros and cons of jump server architectures, role-based shells, and PowerShell limitations. Includes new research on full token hijacking from network logon sessions without hashes or TGTs.
Explore lesser-known smart contract vulnerabilities, bad coding patterns, and defensive strategies. Learn to identify and protect against overlooked attack vectors in blockchain security.
Expert panel explores diverse aspects of critical infrastructure beyond power systems, discussing cybersecurity challenges and resilience strategies for essential services and networks.
Discover the benefits of creating custom security tools for research. Learn how this approach enhances understanding, improves vulnerability detection, and ultimately makes you a more effective security researcher.
Explore Android's vulnerability to Dirty Stream Attacks, where malicious apps exploit file-sharing intents to compromise target applications. Learn detection methods and security measures.
Explore integrating side-channel regression testing into CI development, with practical demonstrations and insights on implementing countermeasures for sample attacks.
Innovative techniques for detecting server-side prototype pollution without causing DoS, including a Burp extension for blackbox testing and identifying JavaScript engines through crafted requests.
Insights into tackling cybercrime targeting fintech platforms in India, exploring hacking techniques, law enforcement challenges, and potential countermeasures to protect the digital economy.
Explore the challenges and solutions in writing secure smart contracts for Web 3.0, including preventing sensitive information leaks and deploying to decentralized servers.
Explore DICOM file vulnerabilities in healthcare and learn about an entropy-based detection technique to identify malicious files, with demonstrations of attacks and protective solutions for Linux and Windows.
Explore Android foreground services vulnerabilities, including a race condition bug and its patch bypass, demonstrating potential escalation of privileges and security implications.
Get personalized course recommendations, track subjects and courses with reminders, and more.