Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Marketing
Programming Languages
Discover Dentistry
Exploring Play: The Importance of Play in Everyday Life
Mathematical Economics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the role of a cyberdefender, dealing with cyberattacks, and managing their impacts with BruCON Security Conference. Less than 1-hour material.
Learn to bypass Microsoft Defender for Identity (MDI) with BruCON Security Conference. Understand MDI, execute high-impact attacks, and avoid triggering detections in under an hour.
Explore the first black-box hardware security evaluation of SpaceX's Starlink User Terminal in this less than 1-hour presentation by BruCON Security Conference. Learn about hardware hacking, satellite communication security, and network exploration.
Learn about Android malware, banking trojans, and protection strategies in this 1-2 hour material from BruCON Security Conference.
Explore defense invention with Allison Miller at the BruCON Security Conference. Dive into myths and stories in under an hour.
Learn ant-forensics techniques with BruCON Security Conference's online material. In under an hour, explore Linux commands, encryption, hardware implants, and more.
Learn about perfect door and padlock designs in less than an hour with BruCON Security Conference. Explore hinges, deadbolts, sensors, and more.
Learn to build an effective internal adversarial simulation team with BruCON Security Conference. Understand threat analysis, defensive coverage, and attack automation in under an hour.
Learn to create real threat intelligence using Evernote in less than an hour with BruCON Security Conference. Explore data-driven feeds, task management, and open-source intel.
Explore cybersecurity, hacking, and INFOSEC balance with David Kennedy in this less than 1-hour BruCON Security Conference keynote.
Explore invisible WiFi and code communication with BruCON Security Conference. Learn about malware outbreaks, deep packet inspection, and stealth mode in under an hour.
Explore mobile network security with BruCON Security Conference. Learn to access SIM-Cards on Android phones, forward GSM and 3G authentication vectors, and modify baseband firmware in under an hour.
Explore the flaws and potential of JavaScript cryptography in this 1-2 hour program by BruCON Security Conference. Uncover vulnerabilities, debunk myths, and gain a solid understanding of JS crypto.
Explore Thunderbolt DMA attacks with BruCON Security Conference. Learn about their limitations, mitigations, and how to attack systems with a Thunderbolt port in under 1 hour.
Learn how to integrate security, legal, and procurement teams to enhance software security in this under 1-hour program by BruCON Security Conference.
Get personalized course recommendations, track subjects and courses with reminders, and more.