Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Marketing
Digital Marketing
Language Learning
Six Sigma Part 1: Define and Measure
Product Management Essentials
How to Succeed at: Interviews
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to crack HiTag2 RFID encryption with Kevin Sheldrake's workshop at 44CON. Understand the technology, authentication, and encryption protocols, and implement attacks. 1-2 hours.
Explore the future of computing with IoT, understand its impact on information security, and learn cost-effective strategies to combat security gaps in this less than 1-hour session by Don A. Bailey at 44CON.
Learn to debug Ring0 code using radare2 in a virtual machine with this less than 1-hour material from 44CON Information Security Conference. Ideal for reverse engineering enthusiasts.
Learn to hunt IoT malware with Olivier Bilodeau's lessons from 44CON, covering honeypot designs, reverse-engineering, and real-world malware cases in under an hour.
Learn to exploit Microsoft Office's native functionality for persistence in compromised workstations, with a focus on add-in mechanisms, from 44CON.
Learn about the vulnerabilities in connected vehicle APIs and apps, with a focus on Subaru's STARLINK, in this short, informative session by Aaron Guzman at 44CON.
Learn to bypass port-based access controls in wireless networks with Gabriel Ryan's presentation at the 44CON Information Security Conference. Less than 1-hour workload.
Learn to automate user interaction with Sheepl in a 1-2 hour program by 44CON Information Security Conference.
Learn to navigate AWS S3 logging challenges in under an hour with Kieren Nicholas Lovell at the 44CON Information Security Conference.
Learn to manage, grow, and retain security research teams effectively with this 1-2 hour material from 44CON Information Security Conference.
Learn to attack development pipelines for profit with this under 1-hour material from 44CON Information Security Conference, covering methodologies, tooling, and real-life issues.
Learn about cloud metadata and SSRF from Cody Brocious at the 44CON Information Security Conference. Master hacking techniques in under an hour.
Learn about unknown IoT attacks in less than an hour with Tony Gee and Vangelis Stykas at the 44CON Information Security Conference.
Learn about information security from J. Wolfgang Goerlich at the 44CON conference, in under an hour.
Learn about human side-channels and their impact on security and privacy in less than an hour with Matt Wixey at 44CON Information Security Conference.
Get personalized course recommendations, track subjects and courses with reminders, and more.