Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Communication Skills
Computer Networking
Astrobiology and the Search for Extraterrestrial Life
Introduction to Computer Science and Programming Using Python
Understanding Multiple Sclerosis (MS)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into Windows drivers with this less than 1-hour material from 44CON Information Security Conference. Learn about IRPs, IRQLs, device object creation, and more.
Learn to automate Man-In-The-Middle attacks with MITMf, a Python framework, in this less than 1-hour program by 44CON Information Security Conference.
Explore the infrastructure of Black Hat's training network, its creation, defense, and maintenance strategies in this under 1-hour material by 44CON Information Security Conference.
Explore Android device security challenges with Joshua J. Drake at the 44CON Information Security Conference. Learn to audit and test multiple devices for similarities and differences. Duration: 1-2 hours.
Explore GSM network vulnerabilities and learn to use GreedyBTS for data compromise with this under-1-hour material from 44CON Information Security Conference.
Explore the vulnerabilities of antivirus software with Joxean Koret at the 44CON Information Security Conference. Learn about attack surfaces, exploiting AV engines, and security enhancements.
Learn about x86 platform misuse, CPU monitoring, and new technologies in this under 1-hour talk by Jacob Torrey at the 44CON Information Security Conference.
Learn advanced incident remediation techniques from Steve Armstrong at 44CON Information Security Conference. Gain insights from real-world experiences, understand different methods, and learn how to effectively respond to network breaches.
Explore the security implications of HDMI Ethernet Channel and related protocols with 44CON's under 1-hour material. Learn about consumer network security, corporate implications, and testing tools.
Learn from hacker and author, April C. Wright, about safeguarding digital components and privacy in this under 1-hour material from 44CON Information Security Conference.
Learn about aviation security pen testing from industry expert Ken Munro in this less than 1-hour material from 44CON Information Security Conference.
Learn to quantify third-party risk effectively with this under 1-hour talk from 44CON Information Security Conference. Gain insights on asking the right questions to assess an organization's commitment to trust and security.
Learn about the flaws in current authentication methods and explore secure alternatives in this concise, less than 1-hour session from 44CON Information Security Conference.
Learn about cloud security, incident handling, and firewall bypassing in less than an hour with Laura Kankaala at 44CON Information Security Conference.
Explore the challenges of integrating security in software development with Lawrence Munro at the 44CON Information Security Conference. Less than 1-hour commitment.
Get personalized course recommendations, track subjects and courses with reminders, and more.