Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the tension between security and privacy in IT systems, examining challenges and strategies for balancing these crucial aspects in modern technology landscapes.
Überblick über aktuelle IT-Sicherheitstrends und -bedrohungen aus der Perspektive von Heise, präsentiert auf der TROOPERS23-Konferenz. Einblicke in die sich entwickelnde Cybersicherheitslandschaft.
Explore SAP forensics techniques for detecting white-collar cybercrime, focusing on anti-forensics methods and investigative strategies in enterprise environments.
Explore techniques for auditing Jupyter notebooks to enhance AI security, focusing on identifying vulnerabilities and implementing best practices for safer AI development.
Explore cutting-edge authentication techniques and their security implications in this talk by Tamas Jos at the TROOPERS23 IT security conference in Heidelberg, Germany.
Explore techniques for extracting NTHashes from Azure AD, uncovering potential security vulnerabilities in cloud identity management systems.
Explore coercion techniques in Windows environments, their impact on IT security, and strategies for defense against these powerful attack vectors.
Explore effective prioritization strategies for IT security actions in this insightful conference talk by Mars Cheng and Dexter Chen at TROOPERS23.
Explore Windows Hello vulnerabilities and attack techniques in this IT security talk, covering biometric authentication weaknesses and potential exploits in Windows systems.
Explore hidden network pathways and security vulnerabilities in IT infrastructures with experts Jonas Bülow Knudsen and Alexander Schmitt at the TROOPERS23 conference in Heidelberg.
Explore reconnecting Active Directory with Azure AD after forest recovery, addressing challenges and best practices for seamless integration in hybrid environments.
Explore Windows telemetry's inner workings, data collection methods, and security implications in this advanced IT security talk. Gain insights to enhance system privacy and protection.
Explore techniques for testing and fuzzing Kubernetes admission configurations to enhance security and identify vulnerabilities in container orchestration systems.
Explore SAP's Remote Function Call (RFC) protocol: its functionality, security implications, and potential vulnerabilities. Gain insights for better understanding and securing SAP systems.
Explore architecture-independent techniques for uncovering software vulnerabilities, enhancing your ability to identify and mitigate security risks across diverse systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.