Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Data Analysis
Artificial Intelligence
Protecting Business Innovations via Patent
Viral Marketing and How to Craft Contagious Content
Discover Dentistry
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore defense invention with Allison Miller at the BruCON Security Conference. Dive into myths and stories in under an hour.
Learn ant-forensics techniques with BruCON Security Conference's online material. In under an hour, explore Linux commands, encryption, hardware implants, and more.
Learn about perfect door and padlock designs in less than an hour with BruCON Security Conference. Explore hinges, deadbolts, sensors, and more.
Learn to build an effective internal adversarial simulation team with BruCON Security Conference. Understand threat analysis, defensive coverage, and attack automation in under an hour.
Learn to create real threat intelligence using Evernote in less than an hour with BruCON Security Conference. Explore data-driven feeds, task management, and open-source intel.
Explore cybersecurity, hacking, and INFOSEC balance with David Kennedy in this less than 1-hour BruCON Security Conference keynote.
Explore invisible WiFi and code communication with BruCON Security Conference. Learn about malware outbreaks, deep packet inspection, and stealth mode in under an hour.
Explore mobile network security with BruCON Security Conference. Learn to access SIM-Cards on Android phones, forward GSM and 3G authentication vectors, and modify baseband firmware in under an hour.
Explore the flaws and potential of JavaScript cryptography in this 1-2 hour program by BruCON Security Conference. Uncover vulnerabilities, debunk myths, and gain a solid understanding of JS crypto.
Explore Thunderbolt DMA attacks with BruCON Security Conference. Learn about their limitations, mitigations, and how to attack systems with a Thunderbolt port in under 1 hour.
Learn how to integrate security, legal, and procurement teams to enhance software security in this under 1-hour program by BruCON Security Conference.
Learn to investigate PowerShell attacks with BruCON Security Conference. Understand common attack patterns, collect forensic artifacts, and limit exposure to attacks in under 1 hour.
Join the BruCON Security Conference for a visual presentation on designing unique prototypes under time and financial constraints, featuring hackers Joe Grand and Zoz.
Learn real-time analysis and visualization techniques in cybersecurity with less than an hour of material from BruCON Security Conference.
Learn to uncover vulnerabilities in SAP software through analysis and manipulation of the SAP Diag protocol in this less than 1-hour material from BruCON Security Conference.
Get personalized course recommendations, track subjects and courses with reminders, and more.