Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Language Learning
Information Technology
Leadership
Competitive Strategy
Functional Programming Principles in Scala
Medical Parasitology | 医å¦å¯„生虫å¦
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to defeat EDRs using dynamic invocation in C# in less than an hour with Jean Francois Maes at BruCON Security Conference.
BruCON Security Conference offers a concise exploration of supply chain intrusion vectors, distinguishing between attack types and providing practical defensive measures.
Learn about Belgium's new cyber strategy aimed at becoming one of the least cyber-vulnerable countries in Europe, in less than an hour with BruCON Security Conference.
Learn about the risks of CI/CD pipeline poisoning via AWS managed services in this under 1-hour session by BruCON Security Conference. Gain insights into securing cloud-based pipelines.
Learn to detect network intruders in real-time with BruCON's innovative method, offering zero endpoint client software and identical fidelity across all OS versions.
Learn to build customized offensive tools and hide them from security products with BruCON Security Conference's under 1-hour material. Gain insights on PE loading techniques and PIC usage.
Explore the evolution of hacktivism over 30 years, its impact during a global pandemic, and its role in policy-making and cyber defense with BruCON Security Conference.
Explore Dan Kaminsky's keynote on TCP/IP Black Ops from BruCON 0x03. Offered by BruCON Security Conference, it requires 1-2 hours of study.
Learn to navigate security controls and incident response in cloud environments with BruCON's 1-2 hour material. Gain knowledge on logging options, improve response times, and automate responses.
Learn to combat cyber threats with the Atomic Threat Coverage framework in this under 1-hour program by BruCON Security Conference. Gain actionable analytics and enhance collaboration in security teams.
Explore the weaknesses in WPA3's Dragonfly handshake with BruCON Security Conference. Understand the attacks, their practical risks, and potential countermeasures in this 1-2 hour study.
Learn to defeat Bluetooth Low Energy 5 PRNG and upgrade your BLE sniffing tool in less than an hour with BruCON Security Conference.
Learn to use Caldera for automated adversary emulation in cybersecurity, improve its reporting engine, and build additional plugins with BruCON Security Conference. (1-2 hours)
Learn to detect Windows management instrumentation (WMI) usage in an enterprise network with BruCON Security Conference. Less than 1-hour material includes custom IDS fingerprints.
Explore the implications of human side-channels for security and privacy in this BruCON Security Conference offering. Learn about forensic linguistics, behavioural signatures, and cultural references.
Get personalized course recommendations, track subjects and courses with reminders, and more.