Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Programming Languages
Data Analysis
Paleontology: Theropod Dinosaurs and the Origin of Birds
Preparing to Manage Human Resources
Transforming Digital Learning: Learning Design Meets Service Design
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the role of a cyberdefender, dealing with cyberattacks, and managing their impacts with BruCON Security Conference. Less than 1-hour material.
Learn to bypass Microsoft Defender for Identity (MDI) with BruCON Security Conference. Understand MDI, execute high-impact attacks, and avoid triggering detections in under an hour.
Explore the first black-box hardware security evaluation of SpaceX's Starlink User Terminal in this less than 1-hour presentation by BruCON Security Conference. Learn about hardware hacking, satellite communication security, and network exploration.
Learn about Android malware, banking trojans, and protection strategies in this 1-2 hour material from BruCON Security Conference.
Learn to identify operational technology malware with BruCON Security Conference. Understand unique challenges, explore simple methods, and use Modbus samples for practical learning. Less than 1-hour workload.
Learn to analyze and exploit eCos firmware for security purposes with this short program from BruCON Security Conference. Gain practical skills in firmware extraction, exploit writing, and device persistence.
Learn to automate binary analysis using Ghidra's P-Code in this short program by BruCON Security Conference. Gain skills in scripting, SDK usage, and understanding Ghidra's intermediate language.
Learn effective physical security bypass techniques from experienced professionals at BruCON Security Conference. Includes war stories and social engineering tactics. Duration:
Explore AWS Cognito security with BruCON Security Conference. In under an hour, learn to identify configuration weaknesses, automate internet-scale analysis, and apply secure practices.
Explore hiring strategies, unconscious bias, and mentorship in the security industry with Kimber Dowsett's discussion at BruCON Security Conference. Less than 1-hour workload.
Explore the transition from 4G to 5G security with BruCON Security Conference. Learn about new vulnerabilities, automated tools for exploiting cellular information, and potential fixes.
Explore the fusion of cloud native SIEM and AI in cybersecurity, its impact on operational security teams, and the role of Threat Hunters with BruCON's under 1-hour session.
Learn to use blue team techniques in red team operations with BruCON Security Conference. Understand how to track analyses, dynamically adjust infrastructures, and create honeypots.
Explore vulnerabilities in Programmable Logic Controllers (PLCs) with BruCON Security Conference. Learn discovery methodologies and how minor vulnerabilities can lead to device takeover in under 1 hour.
Learn to use deception for defense in Active Directory with BruCON Security Conference. Understand how to forge and implant objects, trap adversaries, and deploy open-source scripts.
Get personalized course recommendations, track subjects and courses with reminders, and more.