Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Business Intelligence
Data Analysis
Justice
Multilingual Practices: Tackling Challenges and Creating Opportunities
Introductory Human Physiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to identify and mitigate software supply chain attacks using the PACKJ framework in this less than 1-hour online offering from nullcon.
Learn to build secure software with less effort using a new high-level programming language and compiler, in under an hour with nullcon.
Learn to identify macOS malware threats with a shift-left approach in less than an hour, using built-in utilities and threat intelligence systems. Offered by nullcon.
Explore the design flaw in MobileDevice.framework with nullcon's online material. Learn about its discovery, research, exploitation, and how it was fixed. Less than 1 hour workload.
Explore the Linux kernel patching challenges and solutions with nullcon's under-1-hour material. Learn about automation for patching processes, and use tools for testing patch-completeness.
Explore the workings of UEFI firmware bootkit, CosmicStrand, with nullcon. Learn about its history, how it operates, and how to disinfect systems. Less than 1-hour workload.
Explore the next-gen secure operating system, Bheem OS, with Nullcon. Learn about its unique features like isolated workspaces, improved UI/UX, and cross-platform support in under an hour.
Learn about OWASP ModSecurity Core Rule Set, its key features, and its application in web security from expert Christian Folini in this less than 1-hour webinar by nullcon.
Explore the process of jailbreaking the AppleTV3 with Tihm Star at nullcon. Learn to exploit vulnerabilities, solve problems, and gain full device control in under an hour.
Learn to unearth hidden vulnerabilities in web security with James Kettle's insights from a decade of research. Less than 1-hour commitment.
Dive into Cyber Threat Intelligence with nullcon's concise program. In under an hour, grasp threat intelligence concepts, learn analyst skills, explore frameworks, and maintain anonymity.
Explore macOS security features, vulnerabilities, and bypasses in this under 1-hour webinar by nullcon, led by a Principal Security Researcher at Microsoft.
Explore the impact of the log4j vulnerability across industries with nullcon's webcast. Learn mitigation strategies for 2022 in under an hour.
Learn to model security threats in mobile communication systems using the Bhadra framework in this less than 1-hour webinar by Nokia Bell Labs researcher, Sid Rao, offered by nullcon.
Learn about the history and current trends of ransomware, hacker groups, and defense frameworks in less than an hour with nullcon's webinar.
Get personalized course recommendations, track subjects and courses with reminders, and more.