Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Information Technology
Communication Skills
Project Management
Applied Scrum for Agile Project Management
Sustainable Tourism: Society & Environmental Aspects
Project Management: The Basics for Success
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn to transform your phone into a low-cost IMSI catcher with this 1-2 hour material from 44CON Information Security Conference. Understand mobile security issues and detect silent SMS.
Dive into the internals of Meterpreter, Metasploit's most used payload for Windows, in this less than 1-hour program by 44CON. Explore its lifecycle, Reflective DLL Injection, and Migration.
Learn creative problem-solving with Evan Booth at 44CON, using real-world examples and repurposed Keurigs. Less than 1-hour workload.
Learn about USB-level attacks and remote command control of air-gapped machines with minimal forensic footprint from experts at 44CON Information Security Conference. The material can be completed in under an hour.
Learn to exploit JTAGs for root access in under an hour with Joe FitzPatrick & Matt King at the 44CON Information Security Conference. Topics include memory analysis, kernel patching, and more.
Learn to locate, analyze, and eradicate malware from corporate networks using free tools in this workshop by 44CON Information Security Conference.
Learn about the evolution and new features of Meterpreter in this 1-2 hour material presented by 44CON Information Security Conference. Dive deep into technical details and avoid common pitfalls.
Dive into Windows drivers with this less than 1-hour material from 44CON Information Security Conference. Learn about IRPs, IRQLs, device object creation, and more.
Learn to automate Man-In-The-Middle attacks with MITMf, a Python framework, in this less than 1-hour program by 44CON Information Security Conference.
Explore the infrastructure of Black Hat's training network, its creation, defense, and maintenance strategies in this under 1-hour material by 44CON Information Security Conference.
Explore Android device security challenges with Joshua J. Drake at the 44CON Information Security Conference. Learn to audit and test multiple devices for similarities and differences. Duration: 1-2 hours.
Explore GSM network vulnerabilities and learn to use GreedyBTS for data compromise with this under-1-hour material from 44CON Information Security Conference.
Explore the vulnerabilities of antivirus software with Joxean Koret at the 44CON Information Security Conference. Learn about attack surfaces, exploiting AV engines, and security enhancements.
Learn about x86 platform misuse, CPU monitoring, and new technologies in this under 1-hour talk by Jacob Torrey at the 44CON Information Security Conference.
Learn advanced incident remediation techniques from Steve Armstrong at 44CON Information Security Conference. Gain insights from real-world experiences, understand different methods, and learn how to effectively respond to network breaches.
Get personalized course recommendations, track subjects and courses with reminders, and more.