Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Programming Languages
Graphic Design
Shakespeare Matters
Understanding the GDPR
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn about WiFi-based IMSI catchers, their potential threats, and mitigation strategies in this short program by Security BSides London. Understand mobile network architecture, WiFi authentication, and user privacy issues.
Learn how to identify and manage data leaks with Security BSides London's online program. Understand threat intelligence, discover vulnerable assets, and explore protection strategies in under an hour.
Explore the impacts of CPE configuration disasters, learn about related vulnerabilities, and understand how to prevent remote device takeovers in this under 1-hour material by Security BSides London.
Explore the language of security with Jessica Barker in this under 1-hour material from Security BSides London. Unpack terms, debate definitions, and break communication barriers.
Learn to optimize network monitoring with data analysis in less than an hour with Security BSides London. Reduce unimportant alerts and free up your time.
Learn about Docker's security implications from Security BSides London. Understand its use, misuse, and potential benefits in less than an hour.
Explore open-source malware analysis tools with Security BSides London. Learn to build an automated malware lab, examining tools like Cuckoo Sandbox, Thug, Bro Network Security Monitor, and Volatility Framework.
Learn to evolve penetration testing using threat intelligence and OSINT with Security BSides London. Understand how to turn threat reports into actionable tests in under 1 hour.
Dive into the basics of Elliptic Curve Cryptography (ECC) with this short, accessible program from Security BSides London. Learn how ECC protects data and networks, without the complex maths.
Explore the process of assessing popular software like Adobe Reader, with a focus on security controls, attack surfaces, and fuzzing techniques. Offered by Security BSides London.
Explore the proxy paradox in security with Security BSides London. Understand the gap between technology and security, the role of IAM models, and how to make security and privacy accessible to all.
Learn about the limitations of penetration testing and explore alternative security assessment methods in this short program by Security BSides London.
Learn about cloud computing and security in under an hour with Jimmy Blake's program offered by Security BSides London.
Learn practical crypto attacks against web applications in under an hour with Security BSides London. Covers basics, ECB mode, CBC mode, and more.
Learn about social media security, email spam, web activities, and malware with Dr. Paul Judge's concise material, offered by Security BSides London.
Get personalized course recommendations, track subjects and courses with reminders, and more.