Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Project Management
Digital Marketing
Food as Medicine
Preparing to Manage Human Resources
Improving Communication Skills
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to locate, analyze, and eradicate malware from corporate networks using free tools in this workshop by 44CON Information Security Conference.
Learn about the evolution and new features of Meterpreter in this 1-2 hour material presented by 44CON Information Security Conference. Dive deep into technical details and avoid common pitfalls.
Dive into Windows drivers with this less than 1-hour material from 44CON Information Security Conference. Learn about IRPs, IRQLs, device object creation, and more.
Learn to automate Man-In-The-Middle attacks with MITMf, a Python framework, in this less than 1-hour program by 44CON Information Security Conference.
Explore the infrastructure of Black Hat's training network, its creation, defense, and maintenance strategies in this under 1-hour material by 44CON Information Security Conference.
Explore Android device security challenges with Joshua J. Drake at the 44CON Information Security Conference. Learn to audit and test multiple devices for similarities and differences. Duration: 1-2 hours.
Explore GSM network vulnerabilities and learn to use GreedyBTS for data compromise with this under-1-hour material from 44CON Information Security Conference.
Explore the vulnerabilities of antivirus software with Joxean Koret at the 44CON Information Security Conference. Learn about attack surfaces, exploiting AV engines, and security enhancements.
Learn about x86 platform misuse, CPU monitoring, and new technologies in this under 1-hour talk by Jacob Torrey at the 44CON Information Security Conference.
Learn advanced incident remediation techniques from Steve Armstrong at 44CON Information Security Conference. Gain insights from real-world experiences, understand different methods, and learn how to effectively respond to network breaches.
Explore the security implications of HDMI Ethernet Channel and related protocols with 44CON's under 1-hour material. Learn about consumer network security, corporate implications, and testing tools.
Learn to test and secure 4G (LTE) networks in under an hour with this offering from 44CON Information Security Conference. Gain insights into LTE deployments, potential attacks, and security assurances.
Learn reverse engineering methods for smart cards, focusing on code reverse engineering of vendor’s SDK and card-host communication analysis. Offered by 44CON.
Explore the intersection of social media and psychopathology with this 1-2 hour material from 44CON Information Security Conference. Delve into psychopathic traits, their prevalence, and their manifestation on Twitter.
Learn to enhance your security posture with 44CON's 1-2 hour material. Gain insights on proactive defense, intelligence gathering, and effective modeling, using existing resources.
Get personalized course recommendations, track subjects and courses with reminders, and more.