Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Management & Leadership
Artificial Intelligence
Language Learning
The Modern World, Part One: Global History from 1760 to 1910
Managing Conflicts on Projects with Cultural and Emotional Intelligence
EU policy and implementation: making Europe work!
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Join the BruCON Security Conference for a visual presentation on designing unique prototypes under time and financial constraints, featuring hackers Joe Grand and Zoz.
Learn real-time analysis and visualization techniques in cybersecurity with less than an hour of material from BruCON Security Conference.
Learn to uncover vulnerabilities in SAP software through analysis and manipulation of the SAP Diag protocol in this less than 1-hour material from BruCON Security Conference.
Explore the security implications of HTML5 with BruCON Security Conference. Learn about new attack vectors, potential defenses, and even how to build browser botnets. Less than 1 hour.
Learn to assess smartphone security with BruCON's open-source toolkit, covering unique attack vectors, exploitation, social engineering, and post-exploitation. Less than 1-hour workload.
Learn effective physical security bypass techniques from experienced professionals at BruCON Security Conference. Includes war stories and social engineering tactics. Duration:
Explore AWS Cognito security with BruCON Security Conference. In under an hour, learn to identify configuration weaknesses, automate internet-scale analysis, and apply secure practices.
Explore hiring strategies, unconscious bias, and mentorship in the security industry with Kimber Dowsett's discussion at BruCON Security Conference. Less than 1-hour workload.
Explore the transition from 4G to 5G security with BruCON Security Conference. Learn about new vulnerabilities, automated tools for exploiting cellular information, and potential fixes.
Explore the fusion of cloud native SIEM and AI in cybersecurity, its impact on operational security teams, and the role of Threat Hunters with BruCON's under 1-hour session.
Learn to use blue team techniques in red team operations with BruCON Security Conference. Understand how to track analyses, dynamically adjust infrastructures, and create honeypots.
Explore vulnerabilities in Programmable Logic Controllers (PLCs) with BruCON Security Conference. Learn discovery methodologies and how minor vulnerabilities can lead to device takeover in under 1 hour.
Learn to use deception for defense in Active Directory with BruCON Security Conference. Understand how to forge and implant objects, trap adversaries, and deploy open-source scripts.
Learn to hunt, find, and remediate compromised systems in Azure with Nate Warfield's talk at BruCON Security Conference. Gain insights into proactive Azure security and default configurations.
Learn to create resilient, high-fidelity detections against evasion attempts with FireEye's Advanced Practices Team. Gain insights on detection development with real-world examples. Less than 1-hour workload.
Get personalized course recommendations, track subjects and courses with reminders, and more.