Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Language Learning
Web Development
Data Analysis
Marketing in a Digital World
Maintaining a Mindful Life
Product Management Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to automate Man-In-The-Middle attacks with MITMf, a Python framework, in this less than 1-hour program by 44CON Information Security Conference.
Explore the infrastructure of Black Hat's training network, its creation, defense, and maintenance strategies in this under 1-hour material by 44CON Information Security Conference.
Explore Android device security challenges with Joshua J. Drake at the 44CON Information Security Conference. Learn to audit and test multiple devices for similarities and differences. Duration: 1-2 hours.
Explore GSM network vulnerabilities and learn to use GreedyBTS for data compromise with this under-1-hour material from 44CON Information Security Conference.
Explore the vulnerabilities of antivirus software with Joxean Koret at the 44CON Information Security Conference. Learn about attack surfaces, exploiting AV engines, and security enhancements.
Learn about x86 platform misuse, CPU monitoring, and new technologies in this under 1-hour talk by Jacob Torrey at the 44CON Information Security Conference.
Learn advanced incident remediation techniques from Steve Armstrong at 44CON Information Security Conference. Gain insights from real-world experiences, understand different methods, and learn how to effectively respond to network breaches.
Explore the security implications of HDMI Ethernet Channel and related protocols with 44CON's under 1-hour material. Learn about consumer network security, corporate implications, and testing tools.
Learn to test and secure 4G (LTE) networks in under an hour with this offering from 44CON Information Security Conference. Gain insights into LTE deployments, potential attacks, and security assurances.
Learn reverse engineering methods for smart cards, focusing on code reverse engineering of vendor’s SDK and card-host communication analysis. Offered by 44CON.
Explore the intersection of social media and psychopathology with this 1-2 hour material from 44CON Information Security Conference. Delve into psychopathic traits, their prevalence, and their manifestation on Twitter.
Learn to enhance your security posture with 44CON's 1-2 hour material. Gain insights on proactive defense, intelligence gathering, and effective modeling, using existing resources.
Explore vulnerabilities in mobile point of sales systems with 44CON's under 1-hour material. Learn to exploit weaknesses, understand security implications, and predict future risks.
Learn to use Scratch programming language for network exploitation with Kev Sheldrake's 44CON session. Understand fuzzing, building exploits, and overcoming Scratch API limitations in under an hour.
Learn to enhance data center security using SmartNICs with this 1-2 hour material from 44CON. Gain insights into network layout, security controls, threat models, and tamper-proof host introspection techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.