Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Development
Marketing
Programming Languages
The Analytics Edge
Competitive Strategy
Learning How to Learn: Powerful mental tools to help you master tough subjects
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn hacking and forensics on the go with Phil Polstra at the 44CON Information Security Conference. Less than 1 hour of material.
Learn about the application of surveillance cameras in the computer world with Michael Viscuso at the 44CON Information Security Conference. Duration:
Learn modern post-exploitation strategies from Rich Smith's 1-2 hour material at the 44CON Information Security Conference 2012.
Learn about software security debt in modern development with Ollie Whitehouse at 44CON. Topics include debt management, risk, and strategic restructuring. Less than 1 hour.
Explore the 2012 censorship arms race and Tor with Runa A. Sandvik in a concise, less than 1-hour material from 44CON Information Security Conference.
Learn about information security from experts Thomas Mackenzie & Michele Orru in less than an hour, offered by 44CON.
Learn internet security strategies from expert Jayson E Street in less than an hour, offered by 44CON Information Security Conference.
Explore Don A. Bailey's talk at the 44CON Information Security Conference 2012, with 1-2 hours of material.
Explore terrorism, tracking, privacy, and human interactions in this 1-2 hour material from 44CON Information Security Conference. Learn about big data, wardriving, wireless, and legal issues.
Learn about Windows Pwn 7 OEM from Alex Plaskett's presentation at the 44CON Information Security Conference. Less than 1-hour material.
Learn effective communication strategies with executives in under an hour with Steve Armstrong's presentation at the 44CON Information Security Conference.
Get an unbiased review of Trusteer Rapport by Neil Kettle at the 44CON Information Security Conference. Less than 1-hour material.
Learn logging essentials in under an hour with NCSC Representatives and Duncan Atkin at the 44CON Information Security Conference.
Explore Windows 10's security features and vulnerabilities in a 1-hour presentation by James Forshaw at the 44CON Information Security Conference.
Learn from experts OJ Reeves & Dan Tentler about their experiences with security vulnerability disclosures, including ignored warnings and vendor interactions, in this less than 1-hour session from 44CON.
Get personalized course recommendations, track subjects and courses with reminders, and more.