What is the Future of Blockchain and Cryptocurrencies
Professor Dan Boneh covers recent developments in blockchain and cryptocurrency technologies and how to keep your data secure if you are operating in a non-financial sector.
Find your Perfect Cybersecurity Job
Thinking of building a career in the cybersecurity field? Get expert advice from Neil Daswani.
Big Breaches: What we learned from some of the world’s most disruptive cyberattacks
What led to the world’s most disruptive security breaches? Learn how to protect against vulnerabilities and what you can do to protect your organization.
Lightning in the Skies: Cloud Security Breaches and How to Mitigate Them
Discover how to prepare yourself to architect secure cloud applications and prevent cyberattacks.
Vulnerabilities, security and privacy for machine learning models
Learn common concerns related to machine learning pipeline vulnerabilities, how to protect machine learning data in the cloud, and techniques for securing the privacy of training data.
Cyber Security and COVID-19
The recent transition to remote workforces can make companies vulnerable to new cyberattacks. In this webinar, Neil Daswani shared advice on how to maintain security through this pandemic and beyond.
Stay Safe in the Current Cybersecurity Environment
Stay safe in the current cybersecurity environment Dan Boneh and Neil Daswani share developments in cybersecurity and the best practices you need to follow to prevent a data breach.
6 essential traits you need to look for in an online graduate certificate program
Fitting professional education into a busy schedule
Learn techniques to help you balance online education with a full-time career.
What Does the Future Hold for Cryptocurrency?
Join Joseph A. Grundfest, professor at the Stanford Law School, and find "The truth about trustless systems".
Bugs in Crypto Implementations
Professor Dan Boneh | May 29, 2018
How can you be sure that your messages are safe and secure? Realize the vulnerabilities in WEP and iMessage.
Lessons from Mirai and the Current State of IoT Security
Professor Zakir Durumeric | June 5, 2018
Who was responsible for the Mirai Bonet? What were their motives? Study the evolution of this major attack and its impact on IoT Security.