Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Marketing
Digital Marketing
Language Learning
Six Sigma Part 1: Define and Measure
Product Management Essentials
How to Succeed at: Interviews
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the impact of WebRTC vulnerabilities on mobile apps in this less than 1-hour webinar by nullcon. Learn from Google Project Zero researcher, Natalie Silvanovich.
Learn to automate Threat Intel collection, analysis, and dissemination for predictive intelligence and enhanced organizational visibility with this less than 1-hour webinar by nullcon.
Explore ransomware attack techniques with Vikas Singh, a Senior Malware Escalations specialist at Sophos, in this less than 1-hour webinar by nullcon.
Explore hardware security vulnerabilities in smart energy meters with Sulthan Alaudeen in this less than 1-hour webinar by nullcon. Learn about threat classification, current trends, and penetration testing methodologies.
Learn about security compliance in ICS environments, risk identification, and building a robust security program in this less than 1-hour webinar by nullcon.
Understand the intricacies of Cybersecurity Insurance in less than an hour with Ken Pfeil, Chief Architect for TechDemocracy, in this nullcon webinar.
Learn to assess the security posture of industrial infrastructure using ISA 62443 standard in this less than 1-hour webinar by nullcon. Gain insights into industrial cyber threats and resilience building.
Explore cyber-physical security with Stefano Zanero in this less than 1-hour talk from nullcon. Delve into vulnerability research, root causes of security failures, and potential solutions.
Explore the application of deep learning in cybersecurity with Dr. Satnam Singh in this less than 1-hour talk offered by nullcon. Learn about anomaly detection, malware detection, and adversarial ML use-cases.
Explore XNU heap exploitation with nullcon. Learn about kernel bugs, exploit primitives, and heap manipulation in less than an hour. Ideal for iOS hackers.
Explore the development of iOS jailbreaks and pongoOS, understand SecureROM exploitation, and delve into bootkit and jailbreak development with this 1-2 hour material from nullcon.
Explore vulnerability research on Ruckus Networks' equipment in this less than 1-hour presentation by Gal Zror at nullcon. Learn about pre-authentication remote code execution and more.
Learn to use open-source machine learning tools to detect and block authorization bypass vulnerabilities in web applications, in less than an hour with nullcon.
Learn about the intricacies of bug bounty programs from Adam Ruddermann, an industry expert with experience at Facebook and the NSA, in this less than 1-hour offering from nullcon.
Learn basic security analysis on data and information from Tom Banaria, a digital security consultant at Internews, in less than an hour with nullcon. Topics include social engineering, phishing, and mobile security.
Get personalized course recommendations, track subjects and courses with reminders, and more.