Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Information Technology
Communication Skills
Project Management
Applied Scrum for Agile Project Management
Sustainable Tourism: Society & Environmental Aspects
Project Management: The Basics for Success
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn how to be the first security engineer at a company with this concise guide from 44CON Information Security Conference. Less than 1 hour of material.
Learn the basics of CAN Bus and hands-on fuzzing in less than an hour with this offering from 44CON Information Security Conference.
Learn about card reader software, encryption, and security in less than an hour with 44CON Information Security Conference's online material.
Explore VoIP phone vulnerabilities with 44CON's under 1-hour material. Learn attack targets, firmware access, exploit development, and receive recommendations for users and admins.
Explore .NET Assembly, C interoperability, and scripting languages with Marcello Salvati at the 44CON Information Security Conference. Less than 1-hour workload.
Learn about enterprise security, gated processes, and automation from experts Kyle Tobener and Alessandro Lapucci at the 44CON Information Security Conference. Duration:
Explore IBM's Trusteer Rapport's security aspects in this under 1-hour material from 44CON Information Security Conference, led by Neil Kettle.
Explore global cyber norms, their challenges, and practical implications in less than an hour with 44CON Information Security Conference.
Explore the misunderstood concept of risk in business with Thom Langford at the 44CON Information Security Conference. Learn to recognize, measure, and leverage risk effectively.
Learn to use Hadoop for tackling malware, network forensics, and log analysis in this under 1-hour material from 44CON Information Security Conference.
Learn to develop an effective security awareness program using social engineering techniques with this under 1-hour material from 44CON Information Security Conference.
Learn from Steve Armstrong's 20 years of experience in handling cyber incidents at 44CON Information Security Conference. This under 1-hour material covers common mistakes, effective strategies, and introduces the Cyber Crisis Planning Room.
Explore ARM exploitation, reverse engineering, and vulnerability analysis with 44CON's under 1-hour session on hacking an internet-enabled toy rabbit.
Learn to structure and benefit from bug bounties with Katie Moussouris at the 44CON Information Security Conference. Less than 1-hour commitment.
Explore hacking and manipulating machine learning systems with 44CON's under 1-hour session. Learn to identify weak points, exploit them, and influence output. Live demo included.
Get personalized course recommendations, track subjects and courses with reminders, and more.