Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Marketing
Programming Languages
Discover Dentistry
Exploring Play: The Importance of Play in Everyday Life
Mathematical Economics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore ARM exploitation, reverse engineering, and vulnerability analysis with 44CON's under 1-hour session on hacking an internet-enabled toy rabbit.
Learn to structure and benefit from bug bounties with Katie Moussouris at the 44CON Information Security Conference. Less than 1-hour commitment.
Learn to transform your phone into a low-cost IMSI catcher with this 1-2 hour material from 44CON Information Security Conference. Understand mobile security issues and detect silent SMS.
Dive into the internals of Meterpreter, Metasploit's most used payload for Windows, in this less than 1-hour program by 44CON. Explore its lifecycle, Reflective DLL Injection, and Migration.
Learn creative problem-solving with Evan Booth at 44CON, using real-world examples and repurposed Keurigs. Less than 1-hour workload.
Learn about USB-level attacks and remote command control of air-gapped machines with minimal forensic footprint from experts at 44CON Information Security Conference. The material can be completed in under an hour.
Learn to exploit JTAGs for root access in under an hour with Joe FitzPatrick & Matt King at the 44CON Information Security Conference. Topics include memory analysis, kernel patching, and more.
Learn to locate, analyze, and eradicate malware from corporate networks using free tools in this workshop by 44CON Information Security Conference.
Learn about the evolution and new features of Meterpreter in this 1-2 hour material presented by 44CON Information Security Conference. Dive deep into technical details and avoid common pitfalls.
Dive into Windows drivers with this less than 1-hour material from 44CON Information Security Conference. Learn about IRPs, IRQLs, device object creation, and more.
Learn to automate Man-In-The-Middle attacks with MITMf, a Python framework, in this less than 1-hour program by 44CON Information Security Conference.
Explore the infrastructure of Black Hat's training network, its creation, defense, and maintenance strategies in this under 1-hour material by 44CON Information Security Conference.
Explore Android device security challenges with Joshua J. Drake at the 44CON Information Security Conference. Learn to audit and test multiple devices for similarities and differences. Duration: 1-2 hours.
Explore GSM network vulnerabilities and learn to use GreedyBTS for data compromise with this under-1-hour material from 44CON Information Security Conference.
Explore the vulnerabilities of antivirus software with Joxean Koret at the 44CON Information Security Conference. Learn about attack surfaces, exploiting AV engines, and security enhancements.
Get personalized course recommendations, track subjects and courses with reminders, and more.