Courses from 1000+ universities
Coursera’s flagship credentials may carry big brand names, but who’s actually creating the content?
600 Free Google Certifications
Computer Science
Web Development
Digital Marketing
Greek and Roman Mythology
Improving Your Study Techniques
Understanding the GDPR
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from ShmooCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore hardware decompilation techniques to extract high-level functionality from integrated circuit netlists, drawing parallels with software decompilation for design recovery and hardware assurance.
Strategies for managing human factors during security incidents, focusing on psychological responses, effective communication, and team leadership in high-stress situations.
Explore vulnerabilities in PLCs, learn discovery methods, and see how minor flaws can lead to device takeover. Gain insights into industrial control system security and potential exploits.
Learn techniques to decode obfuscated JavaScript, enhancing your ability to analyze and understand potentially malicious code for improved web security and threat detection.
Explore sensationalized media coverage of cybersecurity incidents, debunking exaggerated claims and examining the reality behind reported hacks and threats.
Explore attack graph analysis to identify multiple vulnerabilities and compromise paths. Learn about tools, techniques, and considerations for effective security assessment and risk mitigation.
Explore methodologies for safeguarding personal information, focusing on asset identification, data classification, and vulnerability assessment to enhance individual privacy protection.
Learn about Bro, a powerful network security monitoring tool. Explore its features, capabilities, and applications in enhancing network defense and threat detection.
Learn about the revival of Ettercap, exploring easy-creds, Lazarus, and Assimilation techniques for network security testing and penetration testing.
Learn DIY integrated circuit decapping techniques to reveal hidden chip designs using budget-friendly methods. Explore mechanical and chemical removal processes, laser cutting, and more.
Explore hardware hacking techniques like CT scanning and chip decapping for non-destructive device analysis, circuit reconstruction, and vulnerability identification in embedded systems and access control.
Explore LD_PRELOAD process injection, its audit system, and whitelisting challenges. Learn about built-in protection vs. bolt-on solutions for Linux security.
Explore 5G protocol vulnerabilities and exploits, analyzing real traffic captures to uncover potential security issues in pre-authentication messages and discuss implications for mobile network security.
Practical insights on implementing Zero Trust security in a cloud-based, remote work environment. Covers challenges, solutions, and lessons learned from real-world experience.
Explore Kubernetes security challenges, attack techniques, and practical advice for pentesters and security practitioners in containerized environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.