Tallo logoTallo logo

Courses

Discover thousands of courses from top institutions and platforms worldwide

47,067 Courses Found

Sort by:
  • Newest First
  • Highest Rated
  • Most Reviewed
  • A to Z
  • Z to A
  • Price: Low to High
  • Price: High to Low
  • Duration: Short to Long
  • Duration: Long to Short
In Search for the Man Who Broke My Neck course thumbnail
FREE

YouTube

In Search for the Man Who Broke My Neck

TED
Storytelling
Resilience

Embark on a profound journey with Joshua Prager in this captivating TED talk as he recounts his quest to find the bus driver responsible for a life-altering accident that left him quadriplegic at 19. Discover how, two decades later, Prager returned to Israel to confront the man who changed his life's trajectory. Delve into the complexities of human nature, identity, and self-perception as Prager shares the mesmerizing tale of their encounter. Explore thought-provoking questions about fate, forgiveness, and the intricate interplay between our experiences and who we become. Gain insights into resilience, personal growth, and the power of confronting one's past in this compelling 19-minute presentation that challenges viewers to reflect on their own life-defining moments and the transformative potential of seeking closure.

Real-Time I/O (RTIO) for Developing Real-Time Zephyr Applications course thumbnail
FREE

YouTube

Real-Time I/O (RTIO) for Developing Real-Time Zephyr Applications

Zephyr
RTOS (Real-time Operating System)
Operating Systems

Explore Real-Time I/O (RTIO), a relatively new subsystem in Zephyr that enables applications to perform time-critical I/O operations in this 40-minute conference talk. Learn the fundamentals of RTIO and understand the differences between asynchronous and synchronous programming paradigms. Examine in-tree examples of RTIO implementation including sensors and bus drivers, and discover how to integrate RTIO into your Zephyr applications through a comprehensive integration guide. Watch a practical demonstration comparing sensor driver performance with and without RTIO to see the real-world impact on application performance. Gain valuable insights for optimizing real-time performance in Zephyr applications and learn techniques to enhance the performance of existing applications struggling with real-time requirements.

Data Driven Bug Bounty course thumbnail
FREE

YouTube

Data Driven Bug Bounty

Security BSides
Data Analysis
Vulnerability Identification

Learn how to maximize the value of your bug bounty program through data-driven approaches in this conference talk from BSidesSF 2018. Explore essential metrics to collect, including response times, vulnerable components, bug classes, and team performance. Discover how to leverage this data to assess security posture, identify weak spots, improve team responsiveness, and measure progress over time. Gain insights into creating effective graphs and metrics for internal use, and understand how to integrate these findings into your security planning process. Enhance your organization's ability to address vulnerabilities efficiently and systematically through data-driven bug bounty management.

Compiler Bugs and Bug Compilers course thumbnail
FREE

YouTube

Compiler Bugs and Bug Compilers

Hack In The Box Security Conference
Software Development
Cybersecurity

Explore the intricacies of compiler bugs and malicious compiler modifications in this conference talk from the Hack In The Box Security Conference. Delve into exotic segfaults encountered while attempting to improve binary output, focusing on Linux systems. Examine popular topics like ELF files, position-independent code, and the Global Offset Table. Investigate how attackers could introduce bugs into binaries using compilers, with a focus on GCC's structure and various compilation stages. Learn about potential methods for injecting vulnerabilities, from removing sanitization code to manipulating architecture-specific machine definitions. Discover the trade-offs between stealth and effectiveness in malicious compiler modifications. Gain insights into detecting an attacker's malicious alterations and understand the importance of securing build environments against potential threats.

Dma-buf Fences vs Android Sync Driver course thumbnail
FREE

YouTube

Dma-buf Fences vs Android Sync Driver

Linux Plumbers Conference
Android Development
Linux file storage systems

Participate in a round-table discussion exploring the differences between dma-buf fences and the Android sync driver. Delve into the semantic distinctions, with dma-buf fences being implicit and Android sync driver being explicit. Examine the specific use cases enabled by each approach and consider whether there's common ground between the two implementations. Evaluate the possibility of a hybrid approach. Join Android developers and key upstream community members in this 47-minute talk from the Linux Plumbers Conference as they tackle these complex file storage system issues.

SAVIOR: Towards Bug-Driven Hybrid Testing course thumbnail
FREE

YouTube

SAVIOR: Towards Bug-Driven Hybrid Testing

Code Coverage
Software Testing
Software Development

Explore a cutting-edge approach to hybrid testing in software development through this IEEE conference talk. Dive into the concept of bug-driven hybrid fuzzing with SAVIOR, a system designed to improve upon traditional code coverage-driven methods. Learn how compile-time analysis, instrumentation, and active property checking can lead to more efficient bug detection. Discover techniques for optimizing resource distribution and path scheduling by combining static and runtime information. Examine the evaluation results of SAVIOR on LAVA-M benchmark and real-world programs, including its performance in triggering UBSAN violations. Gain insights into the potential of bug-to-code ratios for enhancing testing effectiveness and understand how this approach compares to conventional code coverage methods.

How to Find Your Defining Driver - Demons and Drivers course thumbnail
FREE

YouTube

How to Find Your Defining Driver - Demons and Drivers

Resilience
Stress Management
Motivation

Discover the profound connection between childhood stressors and adult behaviors in this insightful 13-minute TEDx talk. Explore the concept of "Demons & Drivers" and learn how to harness the power of your past experiences to fuel your life's purpose. Gain valuable insights into transforming personal challenges into catalysts for growth and success. Uncover strategies for identifying and leveraging your defining driver to overcome obstacles and achieve your goals. This thought-provoking presentation offers a unique perspective on personal development and empowerment, encouraging viewers to embrace their inner demons and channel them towards positive change.

Azure Service Bus course thumbnail

LinkedIn Learning

Certificate

Azure Service Bus

Azure Service Bus
Cloud Computing
Microservices

Learn how to set up and use Azure Service Bus, a fully managed cloud messaging service that keeps your database, storage, and web apps integrated using asynchronous communications.

Reverse Engineering and Bug Hunting on KMDF Drivers course thumbnail
FREE

YouTube

Reverse Engineering and Bug Hunting on KMDF Drivers

44CON
Reverse Engineering
Malware Analysis

Explore reverse engineering and bug hunting techniques for Kernel Mode Driver Framework (KMDF) drivers in this 45-minute conference talk from 44CON 2018. Begin with a quick recap of Windows Driver Model (WDM) drivers, their common structures, and entry point identification. Dive into KMDF, examining relevant functions for reverse engineering through case studies. Learn to interact with KMDF device objects using SetupDI API and analyze IO queue dispatch routines. Investigate whether the framework enhances security by examining major vendor implementation problems. Gain practical knowledge to conduct bug hunting sessions on KMDF drivers, covering topics such as driver models, device objects, IRP major function codes, buffer access methods, and IOCTL codes. Discover techniques for finding KMDF drivers and identifying potential security issues like unsanitized data and kernel pointer leakage.

How to Find Bugs in USB Device Drivers course thumbnail
FREE

YouTube

How to Find Bugs in USB Device Drivers

Black Hat
Software Development
Cybersecurity

Explore the vulnerabilities in USB device drivers through this Black Hat conference talk. Delve into the development of the vUSBf framework, a virtual USB fuzzer based on KVM and QEMU's USB redirection protocol. Learn how this innovative tool enables the execution of up to 150 tests per second on a single Intel system, significantly accelerating the bug detection process. Discover the types of bugs uncovered in Enterprise Linux kernels and current Linux kernels, including null-pointer dereferences, kernel panics, and segfaults. Gain insights into the framework's architecture, its ability to define millions of test cases using XML configuration, and its potential for scaling through a built-in cluster protocol. Understand the implications of these findings for USB security and the importance of systematic analysis in identifying vulnerabilities in hardware-specific drivers.

Driver Risk Scores: Threat Detection System for Vulnerable Device Drivers course thumbnail
FREE

YouTube

Driver Risk Scores: Threat Detection System for Vulnerable Device Drivers

Threat Detection
Cybersecurity
System Security

Learn about the Driver Risk Scores (DRS) threat detection system in this conference talk from BSidesCharm 2024. Explore how to assess and quantify the security risks posed by device drivers through a comprehensive scoring system based on seven critical characteristics. Discover how this scoring methodology, comparable to CVE scoring, combines security features and real-world data to generate actionable insights for system administrators and security teams. Drawing from research at loldrivers.io, understand the varying levels of driver vulnerabilities and learn to make informed decisions about driver deployment in your environment. Presented by Dana Behling, a cybersecurity researcher at Carbon Black, who brings both technical expertise in digital security and a creative approach influenced by her passion for science fiction and fantasy literature.

Bugs Exposed - Unveiling Effective Strategies for Bug Bounty Programs course thumbnail
FREE

YouTube

Bugs Exposed - Unveiling Effective Strategies for Bug Bounty Programs

NahamCon
Cybersecurity
Ethical Hacking

Explore effective strategies for bug bounty programs in this conference talk from NahamCon2023. Gain insights into common misconceptions, examine real-world examples, and learn about back matrixing techniques. Discover how to maximize your first 30 minutes in a bug bounty program to increase your chances of success. Delve into the world of ethical hacking, cybersecurity, and web application security with guidance from an experienced professional in the field.

Geometric Quantum Drives: Hyperbolically Driven Quantum Systems and Beyond course thumbnail
FREE

YouTube

Geometric Quantum Drives: Hyperbolically Driven Quantum Systems and Beyond

Quantum Dynamics
Quantum Mechanics
Physics

A 44-minute talk by Wen Wei Ho at the Erwin Schrödinger International Institute for Mathematics and Physics (ESI) explores the concept of geometric quantum drives, with a focus on hyperbolically driven quantum systems. Delivered as part of the Thematic Programme on "Entanglement in Many-body Quantum Matter: Dynamics, Dissipation, Equilibration," this presentation investigates quantum drives beyond the conventional time-periodic (Floquet) and time-quasiperiodic modulations. Discover a theoretical framework where a classical particle moving on a smooth connected manifold steers a quantum Hamiltonian over time, creating diverse time-dependent quantum Hamiltonians whose properties depend on the underlying manifold and trajectory. Learn about "hyperbolically driven quantum systems" applied to compact 2D hyperbolic Riemann surfaces, and understand how they exhibit topologically classified responses in the adiabatic limit that can be measured through simple local observables. Gain insights into this general framework for mapping the landscape of time-dependent quantum systems, investigating their universal phase structures, and potentially enhancing modern quantum simulator capabilities.

CAN Bus in Aviation course thumbnail
FREE

YouTube

CAN Bus in Aviation

Security BSides
Aviation
Data Access

Explore the critical role of CAN Bus technology in aviation systems through this informative conference talk delivered by Patrick Kiley at BSidesLV 2019. Gain insights into airplane components, aviation-specific elements, and the Aviation Village concept. Discover methods for accessing and analyzing data in aircraft systems, and learn about the Vehicle Spy tool used in aviation cybersecurity. Delve into the intersection of technology and aviation safety in this 28-minute presentation, essential for those interested in aviation security and modern aircraft systems.

Finding Bugs with Burp Plugins and Bug Bounty 101 course thumbnail
FREE

YouTube

Finding Bugs with Burp Plugins and Bug Bounty 101

Burp Suite
Ethical Hacking
Cybersecurity

Explore two essential topics in cybersecurity through this recorded webinar from Bugcrowd's Bug Bash week. Learn how to create automated testing plugins for Burp with Monika Morrow, Senior Security Consultant at AppSec Consulting Inc., and gain insights into bug bounty programs with Ben Sadeghipour. Discover techniques for finding bugs using Burp plugins, access Monika's source code on GitHub, and get an overview of available bug bounty programs, success tips, and resources for beginners. Enhance your cybersecurity skills and knowledge in this 48-minute session, perfect for both aspiring and experienced security professionals.

More Robust I2C Designs with a New Fault-Injection Driver course thumbnail
FREE

YouTube

More Robust I2C Designs with a New Fault-Injection Driver

Linux Kernel Development
Linux
Information Technology

Explore a 35-minute conference talk on improving I2C bus driver robustness through a new fault-injection driver. Learn about the challenges of writing error path code for I2C bus drivers and discover an affordable alternative to expensive I2C bus testers. Examine a GPIO-based driver that operates alongside the bus master driver under inspection, complete with a live demonstration and tips for handling discovered bugs. Discuss the scope and limitations of this driver, and gain insights into bus snooping techniques using only Free Software and OpenHardware. Benefit from Wolfram Sang's extensive experience as a Linux Kernel developer and I2C subsystem maintainer, while also learning about his background in embedded systems and vintage computing.

Modeling BUS in Verilog course thumbnail
FREE

YouTube

Modeling BUS in Verilog

Verilog
Hardware Description Languages (HDL)
Computer Architecture

Learn how to model BUS operations in Verilog, including the use of the generate statement and implementation of a ripple carry adder. Explore practical examples and techniques for efficient digital design in this concise 12-minute video lecture from NPTEL-NOC IITM.

Driver course thumbnail
FREE

YouTube

Driver

Golf
Sports
Ball Position

Explore a comprehensive 6-hour golf tutorial focused on mastering the driver. Learn techniques to balance distance and accuracy, increase clubhead speed, and improve overall driving performance. Discover tips for hitting draws and fades, correcting common mistakes, and optimizing your setup. Address specific challenges faced by senior and beginner golfers, including increasing swing speed and distance. Dive into advanced concepts like swing plane, golf lag, and proper release. Gain insights on fixing slices, improving contact, and achieving an effortless swing. Utilize practical drills and exercises to enhance your driving skills and consistently hit longer, more accurate drives.

Free Drive Cloning Applications for SSDs and Hard Drives course thumbnail
FREE

YouTube

Free Drive Cloning Applications for SSDs and Hard Drives

Data Backup
Data Management
Information Technology

Explore free software options for duplicating and backing up SSDs and hard drives in this comprehensive video tutorial. Learn how to use Samsung Data Migration, DiskGenius, Clonezilla Live, and the Linux DD command to clone drives effectively. Gain practical knowledge on connecting new drives for cloning, using M.2 adapters and USB enclosures, and returning drives to factory state using the Windows DiskPart command. Discover essential tips for drive backups and find links to official software downloads, related videos, and recommended hardware. Whether you're upgrading your PC or creating backups, master the techniques for seamless drive cloning and data migration.

Using GraphQL as a Secure Innovation Boundary and Data-Driven Culture Driver course thumbnail
FREE

YouTube

Using GraphQL as a Secure Innovation Boundary and Data-Driven Culture Driver

NDC Conferences
GraphQL
Prototyping

Explore how GraphQL can be used as a secure innovation boundary and driver of data-driven culture in this conference talk from NDC Sydney 2020. Discover common scenarios faced by organizations struggling with data access, integration, and security. Learn how the speakers implemented a Secure Innovation Boundary called Purple Graph to address these challenges at Telstra Purple. Gain insights into the process of pitching, prototyping, launching, and operating such a system. Understand the technical and non-technical learnings, cultural changes, and best practices for implementing similar solutions in your organization. Walk away with practical tips on leveraging GraphQL to drive innovation, improve data accessibility, and enhance security across your systems.