Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Language Learning
Communication Skills
Programming Languages
Fractals and Scaling
Dino 101: Dinosaur Paleobiology
Supporting Victims of Domestic Violence
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from BruCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore mobile network security with BruCON Security Conference. Learn to access SIM-Cards on Android phones, forward GSM and 3G authentication vectors, and modify baseband firmware in under an hour.
Explore the flaws and potential of JavaScript cryptography in this 1-2 hour program by BruCON Security Conference. Uncover vulnerabilities, debunk myths, and gain a solid understanding of JS crypto.
Explore Thunderbolt DMA attacks with BruCON Security Conference. Learn about their limitations, mitigations, and how to attack systems with a Thunderbolt port in under 1 hour.
Learn how to integrate security, legal, and procurement teams to enhance software security in this under 1-hour program by BruCON Security Conference.
Learn to investigate PowerShell attacks with BruCON Security Conference. Understand common attack patterns, collect forensic artifacts, and limit exposure to attacks in under 1 hour.
Join the BruCON Security Conference for a visual presentation on designing unique prototypes under time and financial constraints, featuring hackers Joe Grand and Zoz.
Learn real-time analysis and visualization techniques in cybersecurity with less than an hour of material from BruCON Security Conference.
Learn to uncover vulnerabilities in SAP software through analysis and manipulation of the SAP Diag protocol in this less than 1-hour material from BruCON Security Conference.
Explore the security implications of HTML5 with BruCON Security Conference. Learn about new attack vectors, potential defenses, and even how to build browser botnets. Less than 1 hour.
Learn to assess smartphone security with BruCON's open-source toolkit, covering unique attack vectors, exploitation, social engineering, and post-exploitation. Less than 1-hour workload.
Explore the role of a cyberdefender, dealing with cyberattacks, and managing their impacts with BruCON Security Conference. Less than 1-hour material.
Learn to bypass Microsoft Defender for Identity (MDI) with BruCON Security Conference. Understand MDI, execute high-impact attacks, and avoid triggering detections in under an hour.
Explore the first black-box hardware security evaluation of SpaceX's Starlink User Terminal in this less than 1-hour presentation by BruCON Security Conference. Learn about hardware hacking, satellite communication security, and network exploration.
Learn about Android malware, banking trojans, and protection strategies in this 1-2 hour material from BruCON Security Conference.
Learn to identify operational technology malware with BruCON Security Conference. Understand unique challenges, explore simple methods, and use Modbus samples for practical learning. Less than 1-hour workload.
Get personalized course recommendations, track subjects and courses with reminders, and more.