Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Language Learning
Information Technology
Leadership
Competitive Strategy
Functional Programming Principles in Scala
Medical Parasitology | 医å¦å¯„生虫å¦
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore automotive cybersecurity with BruCON Security Conference. Learn about ISO/SAE 21434 standard, its key elements, and how they ensure safety in modern cars. Less than 1-hour workload.
Join Rob Fuller in this BruCON Security Conference session, as he shares insights from his diverse infosec career, discussing effective strategies and common pitfalls. Duration:
Explore IoT device vulnerabilities with BruCON's short study using Disney's Circle and Foscam devices as case studies, discussing novel attack techniques and security issues.
Learn to secure container environments from real-world exploits with BruCON Security Conference. Understand Unix sockets, networking, namespaces, and container RPC in under an hour.
Learn from Robert Sell's third-place experience at Defcon 2017 SE CTF about social engineering attacks, data collection using OSINT techniques, and strategies to reduce exposure and risk. Offered by BruCON Security Conference.
Join BruCON Security Conference's keynote, reflecting on a decade of pressing security issues and assessing if progress has been made. Duration: under 1 hour.
Learn to minimize cyber-adversary success in a Windows environment with BruCON Security Conference's material. Gain insights on effective controls, attack lifecycle stages, and automated remediation techniques.
Learn a novel technique for identifying malicious Android applications through HEAP analysis at runtime, offered by BruCON Security Conference. Less than 1-hour workload.
Learn to discover vulnerabilities in embedded systems using code coverage guided fuzzing with BruCON Security Conference. Explore firmware emulation, dynamic binary instrumentation, and guided fuzzing techniques.
BruCON Security Conference offers a brief talk on improving security in organizations and product development, addressing common struggles and solutions.
Learn to use pMap, a tool for network security, in this under 1-hour session by BruCON Security Conference. Discover hosts, perform port scans, and fingerprint operating systems.
Learn to identify vulnerabilities in closed-source software using binary instrumentation techniques with BruCON Security Conference's 1-2 hour material. Tools and code examples included.
Explore new anti-forensics techniques with int0x80 at the BruCON Security Conference. Less than an hour of unique insights for forensic investigators.
Learn to build secure data processing code with BruCON Security Conference. Understand the risks of shotgun parsers and apply the principle of "full recognition before processing" in practice.
Explore the latest in IPv6 security with Fernando Gont in this under 1-hour offering from BruCON Security Conference. Gain insights into deployment, vulnerabilities, and secure protocol implementation.
Get personalized course recommendations, track subjects and courses with reminders, and more.