Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Skills
Introduction to Real-Time Audio Programming in ChucK
L'Italiano nel mondo
Inglés básico: conversacional y networking
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cyber-physical security with Stefano Zanero in this less than 1-hour talk from nullcon. Delve into vulnerability research, root causes of security failures, and potential solutions.
Explore the application of deep learning in cybersecurity with Dr. Satnam Singh in this less than 1-hour talk offered by nullcon. Learn about anomaly detection, malware detection, and adversarial ML use-cases.
Explore XNU heap exploitation with nullcon. Learn about kernel bugs, exploit primitives, and heap manipulation in less than an hour. Ideal for iOS hackers.
Explore the development of iOS jailbreaks and pongoOS, understand SecureROM exploitation, and delve into bootkit and jailbreak development with this 1-2 hour material from nullcon.
Explore vulnerability research on Ruckus Networks' equipment in this less than 1-hour presentation by Gal Zror at nullcon. Learn about pre-authentication remote code execution and more.
Learn to use open-source machine learning tools to detect and block authorization bypass vulnerabilities in web applications, in less than an hour with nullcon.
Learn about the intricacies of bug bounty programs from Adam Ruddermann, an industry expert with experience at Facebook and the NSA, in this less than 1-hour offering from nullcon.
Learn basic security analysis on data and information from Tom Banaria, a digital security consultant at Internews, in less than an hour with nullcon. Topics include social engineering, phishing, and mobile security.
Learn hacking for fun and profit with nullcon's less than 1-hour webinar. Gain experience in reversing, exploitation, and CTFs from security researcher Sudhakar Verma.
Learn to detect adversarial activity in event-streaming data with tools and deep learning approaches in less than an hour with nullcon.
Explore the new features of STIX/TAXII 2.0 and 2.1 standards for Cyber Threat Intelligence in this 1-2 hour program by nullcon. Learn from Allan Thomson, CTO of LookingGlass Cyber Solutions.
Learn how to kickstart a career in security with bug bounty programs, become a competitive candidate in Silicon Valley, and build a strong CV. Offered by nullcon.
Learn about the OWASP Application Security Verification Standard 4.0, its new controls, and how to apply it in your industry with nullcon. Less than 1-hour workload.
Learn about side-channel attacks from Stjepan Picek, a cybersecurity professor at TU Delft, in this less than 1-hour webinar by nullcon. Gain practical knowledge on machine learning-based attacks.
Learn to use DR.CHECKER and DIFUZE for Android Kernel Driver analysis in this less than 1-hour material from nullcon. Gain insights into bug detection and static analysis.
Get personalized course recommendations, track subjects and courses with reminders, and more.