Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Marketing
Programming Languages
Discover Dentistry
Exploring Play: The Importance of Play in Everyday Life
Mathematical Economics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the development of iOS jailbreaks and pongoOS, understand SecureROM exploitation, and delve into bootkit and jailbreak development with this 1-2 hour material from nullcon.
Explore vulnerability research on Ruckus Networks' equipment in this less than 1-hour presentation by Gal Zror at nullcon. Learn about pre-authentication remote code execution and more.
Learn to use open-source machine learning tools to detect and block authorization bypass vulnerabilities in web applications, in less than an hour with nullcon.
Learn about the intricacies of bug bounty programs from Adam Ruddermann, an industry expert with experience at Facebook and the NSA, in this less than 1-hour offering from nullcon.
Learn basic security analysis on data and information from Tom Banaria, a digital security consultant at Internews, in less than an hour with nullcon. Topics include social engineering, phishing, and mobile security.
Learn hacking for fun and profit with nullcon's less than 1-hour webinar. Gain experience in reversing, exploitation, and CTFs from security researcher Sudhakar Verma.
Learn to detect adversarial activity in event-streaming data with tools and deep learning approaches in less than an hour with nullcon.
Explore the new features of STIX/TAXII 2.0 and 2.1 standards for Cyber Threat Intelligence in this 1-2 hour program by nullcon. Learn from Allan Thomson, CTO of LookingGlass Cyber Solutions.
Learn how to kickstart a career in security with bug bounty programs, become a competitive candidate in Silicon Valley, and build a strong CV. Offered by nullcon.
Learn about the OWASP Application Security Verification Standard 4.0, its new controls, and how to apply it in your industry with nullcon. Less than 1-hour workload.
Learn about side-channel attacks from Stjepan Picek, a cybersecurity professor at TU Delft, in this less than 1-hour webinar by nullcon. Gain practical knowledge on machine learning-based attacks.
Learn to use DR.CHECKER and DIFUZE for Android Kernel Driver analysis in this less than 1-hour material from nullcon. Gain insights into bug detection and static analysis.
Learn to bypass Stingray detectors using the White-Stingray tool in this short, intensive program by nullcon. Understand 2G and 3G attacking techniques and improve mobile security.
Explore hacker techniques in mobile networks with nullcon's concise material, covering SS7 vulnerabilities, SMS bypass, and more. Less than 1 hour workload.
Explore the vulnerabilities of digital banking in India with nullcon's concise material, focusing on flaws in passbook printing machines, government wallets, and credit/debit cards.
Get personalized course recommendations, track subjects and courses with reminders, and more.