Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Programming Languages
Data Analysis
Paleontology: Theropod Dinosaurs and the Origin of Birds
Preparing to Manage Human Resources
Transforming Digital Learning: Learning Design Meets Service Design
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from nullcon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn to assess the security posture of industrial infrastructure using ISA 62443 standard in this less than 1-hour webinar by nullcon. Gain insights into industrial cyber threats and resilience building.
Explore cyber-physical security with Stefano Zanero in this less than 1-hour talk from nullcon. Delve into vulnerability research, root causes of security failures, and potential solutions.
Explore the application of deep learning in cybersecurity with Dr. Satnam Singh in this less than 1-hour talk offered by nullcon. Learn about anomaly detection, malware detection, and adversarial ML use-cases.
Explore XNU heap exploitation with nullcon. Learn about kernel bugs, exploit primitives, and heap manipulation in less than an hour. Ideal for iOS hackers.
Explore the development of iOS jailbreaks and pongoOS, understand SecureROM exploitation, and delve into bootkit and jailbreak development with this 1-2 hour material from nullcon.
Explore vulnerability research on Ruckus Networks' equipment in this less than 1-hour presentation by Gal Zror at nullcon. Learn about pre-authentication remote code execution and more.
Learn to use open-source machine learning tools to detect and block authorization bypass vulnerabilities in web applications, in less than an hour with nullcon.
Learn about the intricacies of bug bounty programs from Adam Ruddermann, an industry expert with experience at Facebook and the NSA, in this less than 1-hour offering from nullcon.
Learn basic security analysis on data and information from Tom Banaria, a digital security consultant at Internews, in less than an hour with nullcon. Topics include social engineering, phishing, and mobile security.
Learn hacking for fun and profit with nullcon's less than 1-hour webinar. Gain experience in reversing, exploitation, and CTFs from security researcher Sudhakar Verma.
Learn to detect adversarial activity in event-streaming data with tools and deep learning approaches in less than an hour with nullcon.
Explore the new features of STIX/TAXII 2.0 and 2.1 standards for Cyber Threat Intelligence in this 1-2 hour program by nullcon. Learn from Allan Thomson, CTO of LookingGlass Cyber Solutions.
Learn how to kickstart a career in security with bug bounty programs, become a competitive candidate in Silicon Valley, and build a strong CV. Offered by nullcon.
Learn about the OWASP Application Security Verification Standard 4.0, its new controls, and how to apply it in your industry with nullcon. Less than 1-hour workload.
Learn about side-channel attacks from Stjepan Picek, a cybersecurity professor at TU Delft, in this less than 1-hour webinar by nullcon. Gain practical knowledge on machine learning-based attacks.
Get personalized course recommendations, track subjects and courses with reminders, and more.