Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Marketing
Business Intelligence
Cybersecurity
Fractals and Scaling
Introducción a la genética y la evolución
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore vulnerability research on Ruckus Networks' equipment in this less than 1-hour presentation by Gal Zror at nullcon. Learn about pre-authentication remote code execution and more.
Learn to use open-source machine learning tools to detect and block authorization bypass vulnerabilities in web applications, in less than an hour with nullcon.
Learn about the intricacies of bug bounty programs from Adam Ruddermann, an industry expert with experience at Facebook and the NSA, in this less than 1-hour offering from nullcon.
Learn basic security analysis on data and information from Tom Banaria, a digital security consultant at Internews, in less than an hour with nullcon. Topics include social engineering, phishing, and mobile security.
Learn hacking for fun and profit with nullcon's less than 1-hour webinar. Gain experience in reversing, exploitation, and CTFs from security researcher Sudhakar Verma.
Learn to detect adversarial activity in event-streaming data with tools and deep learning approaches in less than an hour with nullcon.
Explore the new features of STIX/TAXII 2.0 and 2.1 standards for Cyber Threat Intelligence in this 1-2 hour program by nullcon. Learn from Allan Thomson, CTO of LookingGlass Cyber Solutions.
Learn how to kickstart a career in security with bug bounty programs, become a competitive candidate in Silicon Valley, and build a strong CV. Offered by nullcon.
Learn about the OWASP Application Security Verification Standard 4.0, its new controls, and how to apply it in your industry with nullcon. Less than 1-hour workload.
Explore the latest in cloud Wi-Fi, its business potential, and protection against wireless threats in this less than 1-hour material by nullcon.
Learn to use Zulu, a GUI-based fuzzer for ASCII or binary protocols, in less than an hour with nullcon. Discover how to capture, mutate, and replay protocols easily.
Explore the security of the SAML protocol, understand XML signature attacks, and learn to fuzz SAML assertions in this less than 1-hour material by nullcon.
Learn advanced smartphone forensics with nullcon, focusing on Apple iCloud, encrypted BlackBerry backups, and Windows Phone 8. Less than 1-hour workload.
Learn to use cloud services for WPA/WPA2 cracking in less than an hour with nullcon's concise guide, covering dictionary attacks, open-source tools, and cost analysis.
Explore the challenges of data security in the digital age with Shantanu Ghosh, VP of Symantec's India Product Operations, in this less than 1-hour material from nullcon.
Get personalized course recommendations, track subjects and courses with reminders, and more.