Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Communication Skills
Software Development
Graphic Design
Gender and Sexuality: Applications in Society
Bioseguridad y equipo de protección para la prevención de COVID-19
An Introduction to Interactive Programming in Python (Part 1)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to generate contextual and actionable threat intelligence using a MISP ecosystem, with BruCON Security Conference. Ideal for reducing false positives and enhancing SOC workflows.
BruCON's online material unpacks the role of a cyber threat intelligence analyst, using the Mandiant CTI Analyst Core Competencies Framework. It highlights collaboration optimization and informs hiring decisions.
Explore the vulnerabilities of "secure" portable storage devices with 256-bit AES hardware encryption in this less than 1-hour presentation by BruCON Security Conference.
Explore the novel ICS-oriented attack tools, INCONTROLLER, in this less than 1-hour material from BruCON Security Conference. Learn about its components, attack scenarios, and defense implications.
Explore innovative phishing techniques using Microsoft Office features in this under 1-hour presentation by BruCON Security Conference. Learn to identify and exploit vulnerabilities in signed Office add-ins.
Explore the critical role of DNS in internet transactions and security measures with this BruCON Security Conference offering. Learn about DNS operations, risk evaluation, and best practices.
Learn about network load balancers, their vulnerabilities, and how to secure them in this short program by BruCON Security Conference. Ideal for both offensive operations and defenders.
Explore evolving attacker methodologies and build better defenses with David Kennedy in this under 1-hour session offered by BruCON Security Conference.
Learn to defeat EDRs using dynamic invocation in C# in less than an hour with Jean Francois Maes at BruCON Security Conference.
BruCON Security Conference offers a concise exploration of supply chain intrusion vectors, distinguishing between attack types and providing practical defensive measures.
Learn about Belgium's new cyber strategy aimed at becoming one of the least cyber-vulnerable countries in Europe, in less than an hour with BruCON Security Conference.
Learn about the risks of CI/CD pipeline poisoning via AWS managed services in this under 1-hour session by BruCON Security Conference. Gain insights into securing cloud-based pipelines.
Learn to detect network intruders in real-time with BruCON's innovative method, offering zero endpoint client software and identical fidelity across all OS versions.
Learn to build customized offensive tools and hide them from security products with BruCON Security Conference's under 1-hour material. Gain insights on PE loading techniques and PIC usage.
Explore the evolution of hacktivism over 30 years, its impact during a global pandemic, and its role in policy-making and cyber defense with BruCON Security Conference.
Get personalized course recommendations, track subjects and courses with reminders, and more.