Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Programming Languages
Graphic Design
Shakespeare Matters
Understanding the GDPR
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn from Steve Armstrong's 20 years of experience in handling cyber incidents at 44CON Information Security Conference. This under 1-hour material covers common mistakes, effective strategies, and introduces the Cyber Crisis Planning Room.
Explore ARM exploitation, reverse engineering, and vulnerability analysis with 44CON's under 1-hour session on hacking an internet-enabled toy rabbit.
Learn to structure and benefit from bug bounties with Katie Moussouris at the 44CON Information Security Conference. Less than 1-hour commitment.
Learn to transform your phone into a low-cost IMSI catcher with this 1-2 hour material from 44CON Information Security Conference. Understand mobile security issues and detect silent SMS.
Dive into the internals of Meterpreter, Metasploit's most used payload for Windows, in this less than 1-hour program by 44CON. Explore its lifecycle, Reflective DLL Injection, and Migration.
Learn creative problem-solving with Evan Booth at 44CON, using real-world examples and repurposed Keurigs. Less than 1-hour workload.
Learn about USB-level attacks and remote command control of air-gapped machines with minimal forensic footprint from experts at 44CON Information Security Conference. The material can be completed in under an hour.
Learn to exploit JTAGs for root access in under an hour with Joe FitzPatrick & Matt King at the 44CON Information Security Conference. Topics include memory analysis, kernel patching, and more.
Learn to locate, analyze, and eradicate malware from corporate networks using free tools in this workshop by 44CON Information Security Conference.
Learn about the evolution and new features of Meterpreter in this 1-2 hour material presented by 44CON Information Security Conference. Dive deep into technical details and avoid common pitfalls.
Dive into Windows drivers with this less than 1-hour material from 44CON Information Security Conference. Learn about IRPs, IRQLs, device object creation, and more.
Learn to automate Man-In-The-Middle attacks with MITMf, a Python framework, in this less than 1-hour program by 44CON Information Security Conference.
Explore the infrastructure of Black Hat's training network, its creation, defense, and maintenance strategies in this under 1-hour material by 44CON Information Security Conference.
Explore Android device security challenges with Joshua J. Drake at the 44CON Information Security Conference. Learn to audit and test multiple devices for similarities and differences. Duration: 1-2 hours.
Explore GSM network vulnerabilities and learn to use GreedyBTS for data compromise with this under-1-hour material from 44CON Information Security Conference.
Get personalized course recommendations, track subjects and courses with reminders, and more.