Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Programming Languages
Digital Marketing
Digital Skills
Constitutional Interpretation
Introduction to Philosophy
Learning How to Learn: Powerful mental tools to help you master tough subjects
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore GSM network vulnerabilities and learn to use GreedyBTS for data compromise with this under-1-hour material from 44CON Information Security Conference.
Explore the vulnerabilities of antivirus software with Joxean Koret at the 44CON Information Security Conference. Learn about attack surfaces, exploiting AV engines, and security enhancements.
Learn about x86 platform misuse, CPU monitoring, and new technologies in this under 1-hour talk by Jacob Torrey at the 44CON Information Security Conference.
Learn advanced incident remediation techniques from Steve Armstrong at 44CON Information Security Conference. Gain insights from real-world experiences, understand different methods, and learn how to effectively respond to network breaches.
Explore the security implications of HDMI Ethernet Channel and related protocols with 44CON's under 1-hour material. Learn about consumer network security, corporate implications, and testing tools.
Learn reverse engineering methods for smart cards, focusing on code reverse engineering of vendor’s SDK and card-host communication analysis. Offered by 44CON.
Explore the intersection of social media and psychopathology with this 1-2 hour material from 44CON Information Security Conference. Delve into psychopathic traits, their prevalence, and their manifestation on Twitter.
Learn to use Scratch programming language for network exploitation with Kev Sheldrake's 44CON session. Understand fuzzing, building exploits, and overcoming Scratch API limitations in under an hour.
Learn to identify and exploit ephemeral vulnerabilities in networks and applications with this under 1-hour material from 44CON Information Security Conference.
Learn ARM assembly and shellcode basics in a 2-3 hour workshop by Saumil Shah at 44CON. Write and test shellcode on ARM hardware and QEMU emulator.
Explore Java's Remote Method Invocation (RMI) security issues with Nicky Bloor at 44CON. Learn about RMI enumeration, exploitation, and potential security solutions in under an hour.
Learn to identify and attack Microsoft Advanced Threat Analytics (ATA) installations in less than an hour with Nikhil Mittal at 44CON Information Security Conference.
Dive into cryptanalysis with Robert Weiss & Ben Gatti at 44CON, exploring the Enigma Machine in under an hour. Uncover its history, workings, and significance.
Explore penetration testing's pitfalls and alternatives in this under 1-hour material from 44CON Information Security Conference, presented by Haroon Meer.
Learn USB Flash Drive Forensics in less than an hour with Philip Polstra's presentation at the 44CON Information Security Conference.
Get personalized course recommendations, track subjects and courses with reminders, and more.