Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Language Learning
Digital Marketing
ChatGPT
EU policy and implementation: making Europe work!
Max MSP Programming Course: Structuring Interactive Software for Digital Arts
Mathematical and Computational Methods
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Hack.lu. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore the security aspects of HID Global Soft Token with Mouad Abouhali from Airbus Group Innovations. Learn about encryption keys, OTP keys, and uncover vulnerabilities in less than an hour.
Explore denial of service attacks from the provider's perspective in this less than 1-hour material by Cooper. Learn about 'booter' services, their operation, and escalation to other forms of cybercrime.
Explore the abuse of Bash for Windows in less than an hour with Cooper. Learn about installation, main differences, fun facts, and how to bypass Applocker.
Learn modern pentest tricks for faster, wider, greater engagements in less than an hour with Cooper's online material. Includes practical applications and demos.
Learn about path normalization vulnerabilities, how to spot them, and mitigation strategies in less than an hour with Cooper's cybersecurity material.
Learn to find the best Threat Intelligence (TI) provider with Cooper's under 1-hour program. Gain insights on vendor comparison, false positives, and data analysis.
Learn to create ARM shellcode with Cooper's concise program. In under an hour, master techniques like ARM execve() Shellcode and mprotect Egghunter.
Learn digital safety for politically vulnerable organizations in less than an hour with Cooper's concise program, covering security policies, incident response, and data retention.
Learn about Inter-process communication (IPC) vulnerabilities and mitigation strategies in less than an hour with Cooper's online material.
Learn to bypass ISP and enterprise Anti-DDoS using 90's technology in less than an hour with Cooper's concise program. Includes data analysis and demonstrations.
In less than an hour, learn from Cooper how Trojans bypass security measures in SS7, covering topics from basic identifiers to STP and Location Kraken.
Explore the history and security of fax technology with Eyal Itkin and Yaniv Balmas in this less than 1-hour material from Cooper. Learn debugging, vulnerabilities, and mitigation strategies.
Explore hacking techniques with Cooper's under 1-hour material, covering infection vectors, lateral movement, and backdoor monitoring.
Learn to diagnose and respond to threats with Cooper's concise program. Gain insights into activism, emergency medical response, and security in under an hour.
Learn to detect threats in telecom networks using the TIDS framework, with a focus on security network monitoring and anomaly detection. Offered by Cooper, it takes less than an hour.
Get personalized course recommendations, track subjects and courses with reminders, and more.