Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Marketing
Programming Languages
Discover Dentistry
Exploring Play: The Importance of Play in Everyday Life
Mathematical Economics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Hack.lu. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn to exploit vulnerabilities in notorious C&C toolkits with Waylon Grange in less than an hour. Offered by Cooper, this study reveals patterns in APT reports and provides tools for launching an offensive against attackers.
Explore the dynamics of information dissemination on social media and its potential misuse in this short program by Cooper. Learn from case studies and understand the impact of social media on world events.
Explore the potential of IPv4 in rDDoS attacks with Cooper's under 1-hour material. Learn to calculate, track, and visualize these numbers over time, and discuss resource allocation for threat mitigation.
Learn about API design for cryptography from Frank Denis, with a focus on cryptographic libraries and their APIs. Offered by Cooper, it takes less than an hour.
Learn to use Sigma for log signatures, with an open repository and conversion tool, in less than an hour with Cooper. Ideal for security researchers and software developers.
Learn to use MISP for bulk surveillance of malware with John Bambenek in less than an hour, offered by Cooper.
Explore USB attack vectors and learn to develop Keynterceptor, a proof-of-concept keyboard implant, in this less than 1-hour material by Cooper. Ideal for those interested in hardware hacking and anomaly detection.
Learn to use and exploit Intel AMT for machine control and forensics, with Google's Security Engineer, Parth Shukla. Understand attack vectors, mitigation, and prevention in under an hour.
Learn to automate .NET analysis with WinDBG, analyze PowerShell scripts, and unpack .NET packer family in less than an hour with Paul Rascagneres from Cooper.
Explore privacy from a unique perspective with Sarah Jamie Lewis from Cooper. Learn through real-life stories about the need for inclusive, safe systems for marginalized individuals. Less than 1hr.
Learn to secure PHP applications with Snuffleupagus, an open-source security module, in under an hour with Cooper's experts.
Explore real-world cryptographic disasters with Cooper's under 1-hour material. Learn to identify failures, subvert malware intent, and potentially save yourself from sticky situations.
Learn how to engineer a sensor network to capture and interpret 802.11x frames, resolve GPS locations, and carry out MiTM attacks with Cooper's under 1-hour material.
Explore the security vulnerabilities of modern intercom systems with Sébastien Dudek, a security consultant at Synacktiv. Learn about attack vectors, practical attacks, and security recommendations in under an hour.
Explore the intriguing world of malware with Marion Marschalek, Principal Malware Researcher at G DATA Advanced Analytics. In less than an hour, delve into the unique traits, stealth tactics, and functionalities of CheshireCat malware.
Get personalized course recommendations, track subjects and courses with reminders, and more.