Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Programming Languages
Digital Skills
Management & Leadership
Tsinghua Chinese: Start Talking with 1.3 Billion People
Mining Massive Datasets
Extreme Geological Events
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from nullcon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn to identify and mitigate software supply chain attacks using the PACKJ framework in this less than 1-hour online offering from nullcon.
Learn to build secure software with less effort using a new high-level programming language and compiler, in under an hour with nullcon.
Learn to identify macOS malware threats with a shift-left approach in less than an hour, using built-in utilities and threat intelligence systems. Offered by nullcon.
Explore the design flaw in MobileDevice.framework with nullcon's online material. Learn about its discovery, research, exploitation, and how it was fixed. Less than 1 hour workload.
Explore the Linux kernel patching challenges and solutions with nullcon's under-1-hour material. Learn about automation for patching processes, and use tools for testing patch-completeness.
Explore the workings of UEFI firmware bootkit, CosmicStrand, with nullcon. Learn about its history, how it operates, and how to disinfect systems. Less than 1-hour workload.
Explore the next-gen secure operating system, Bheem OS, with Nullcon. Learn about its unique features like isolated workspaces, improved UI/UX, and cross-platform support in under an hour.
Explore graphical passwords with nullcon's concise program. Learn to create complex yet memorable passwords, understand security effects, and future roadmap. Less than 1hr needed.
Explore offensive research with nullcon's under 1-hour material on USB Data Modems fuzzing and SMS payload code execution. Ideal for understanding potential future attack surfaces.
Learn threat modeling basics, understand the STRIDE Threat Model, and use OWASP Threat Dragon in less than an hour with nullcon. Basic knowledge of Data Flow Diagrams required.
Learn to deploy security tools in hostile environments using Kubernetes and containerization, with Google Security Engineer, John Nichols. Offered by nullcon, it's under 1 hour.
Learn to detect adversarial activity in event-streaming data with tools and deep learning approaches in less than an hour with nullcon.
Explore the new features of STIX/TAXII 2.0 and 2.1 standards for Cyber Threat Intelligence in this 1-2 hour program by nullcon. Learn from Allan Thomson, CTO of LookingGlass Cyber Solutions.
Learn how to kickstart a career in security with bug bounty programs, become a competitive candidate in Silicon Valley, and build a strong CV. Offered by nullcon.
Learn about the OWASP Application Security Verification Standard 4.0, its new controls, and how to apply it in your industry with nullcon. Less than 1-hour workload.
Get personalized course recommendations, track subjects and courses with reminders, and more.