Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Programming Languages
Graphic Design
Shakespeare Matters
Understanding the GDPR
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to create ARM shellcode with Cooper's concise program. In under an hour, master techniques like ARM execve() Shellcode and mprotect Egghunter.
Learn digital safety for politically vulnerable organizations in less than an hour with Cooper's concise program, covering security policies, incident response, and data retention.
Learn about Inter-process communication (IPC) vulnerabilities and mitigation strategies in less than an hour with Cooper's online material.
Learn to bypass ISP and enterprise Anti-DDoS using 90's technology in less than an hour with Cooper's concise program. Includes data analysis and demonstrations.
In less than an hour, learn from Cooper how Trojans bypass security measures in SS7, covering topics from basic identifiers to STP and Location Kraken.
Explore the history and security of fax technology with Eyal Itkin and Yaniv Balmas in this less than 1-hour material from Cooper. Learn debugging, vulnerabilities, and mitigation strategies.
Explore hacking techniques with Cooper's under 1-hour material, covering infection vectors, lateral movement, and backdoor monitoring.
Learn to diagnose and respond to threats with Cooper's concise program. Gain insights into activism, emergency medical response, and security in under an hour.
Explore TheHive and MISP with Saâd Kadhi in this less than 1-hour material by Cooper, covering sharing, extension models, RF channel, and more.
Explore sandboxing techniques and Adobe Flash vulnerabilities with Björn Ruytenberg in this under 1-hour material from Cooper. Learn about input validation, sandbox escape vulnerabilities, and more.
Learn to detect threats in telecom networks using the TIDS framework, with a focus on security network monitoring and anomaly detection. Offered by Cooper, it takes less than an hour.
Explore the world of vulnerability disclosure, bug bounties, and their impact on policy-making in this less than 1-hour material by Jeroen van der Ham, offered by Cooper.
Learn to strategize security for small development teams with Eleanor Saitta's toolkit. Understand risk, compliance, staffing, and consultant collaboration in under an hour with Cooper.
Learn to exploit vulnerabilities in notorious C&C toolkits with Waylon Grange in less than an hour. Offered by Cooper, this study reveals patterns in APT reports and provides tools for launching an offensive against attackers.
Explore the dynamics of information dissemination on social media and its potential misuse in this short program by Cooper. Learn from case studies and understand the impact of social media on world events.
Get personalized course recommendations, track subjects and courses with reminders, and more.