Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Business Intelligence
Data Analysis
Justice
Multilingual Practices: Tackling Challenges and Creating Opportunities
Introductory Human Physiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from TROOPERS. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn to achieve pharma compliance for cloud computing in under an hour with WEareTROOPERS.
Explore the foundations of information security with WEareTROOPERS. This under 1-hour program covers technical debt, low-level attacks, risk modeling, and OS X security.
Learn to securely deploy IPv6 and avoid common mistakes in this 1-2 hour program by WEareTROOPERS, covering security infrastructure, addressing, transition technologies, and more.
Learn to defend enterprise against network infrastructure attacks with WEareTROOPERS. Topics include Cisco routing, encryption, and BGP hijacking. 1-2 hours.
Learn to hack FinSpy with Atilla Marosi in less than an hour with WEareTROOPERS. Topics include debugging, network communication, and encryption.
Learn to enable and secure IPv6 in service provider networks with WEareTROOPERS. Understand network architecture, configuration, and problem-solving in under an hour.
Learn SAP custom code protection, security compliance, and best practices from WEareTROOPERS in under an hour.
Explore new features of the SI6 Networks' IPv6 Toolkit with WEareTROOPERS. Learn about supported operating systems, automatic address scanning, and TCP6 Toolkit in 1-2 hours.
Learn to protect AD from credential theft with WEareTROOPERS. This under 1-hour material covers Windows authentication, Kerberos, mitigation strategies, and more.
Explore cyber security with WEareTROOPERS in less than an hour. Learn about decapitation attacks, core stealing, and playing dirty in the digital world.
Learn to implement a USB Host Driver Fuzzer with WEareTROOPERS in less than an hour, covering USB basics, security, and fuzzing payload.
Explore 20 ways past secure boot with WEareTROOPERS. This under 1-hour material covers secure boot theory, debug access, timing attacks, design mistakes, and key management.
Explore the relationship between privacy and security with WEareTROOPERS in less than an hour. Learn to navigate debates, understand biases, and improve commercial positioning.
Learn to use the flexible open-source platform, Bro, with WEareTROOPERS. Topics include packet capturing, protocol analysis, and intelligence integration.
Learn about granular trust models and their application in security with this less than 1-hour material from WEareTROOPERS, covering topics from authentication to disaster recovery.
Get personalized course recommendations, track subjects and courses with reminders, and more.