Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Marketing
Business Intelligence
Cybersecurity
Fractals and Scaling
Introducción a la genética y la evolución
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn the basics of social engineering with Security BSides London. Understand reconnaissance, dress styles, pretext creation, and interaction with staff in under an hour.
Learn to use IPFIX for botnet traffic capture and threat detection with Security BSides London. This under 1-hour material introduces BotProbe, reducing traffic volumes by 97%.
Explore threat detection failures and solutions with Security BSides London. Learn about key issues, information sharing, employee retention, and detection tooling in under an hour.
Explore the importance of random number generation in IoT security with Security BSides London. Understand the current state of the art, assessment results, and future directions in less than an hour.
Learn real-life threat hunting techniques, analytical approaches, and cutting-edge TTPs from Security BSides London. Less than 1-hour workload.
Explore modern cryptography techniques for anonymous credentials with Security BSides London. Learn about elliptic curve cryptography, zero knowledge proofs, and linkable ring signatures in under an hour.
Learn about WiFi-based IMSI catchers, their potential threats, and mitigation strategies in this short program by Security BSides London. Understand mobile network architecture, WiFi authentication, and user privacy issues.
Learn how to identify and manage data leaks with Security BSides London's online program. Understand threat intelligence, discover vulnerable assets, and explore protection strategies in under an hour.
Explore the impacts of CPE configuration disasters, learn about related vulnerabilities, and understand how to prevent remote device takeovers in this under 1-hour material by Security BSides London.
Explore the language of security with Jessica Barker in this under 1-hour material from Security BSides London. Unpack terms, debate definitions, and break communication barriers.
Learn to optimize network monitoring with data analysis in less than an hour with Security BSides London. Reduce unimportant alerts and free up your time.
Learn about Docker's security implications from Security BSides London. Understand its use, misuse, and potential benefits in less than an hour.
Explore open-source malware analysis tools with Security BSides London. Learn to build an automated malware lab, examining tools like Cuckoo Sandbox, Thug, Bro Network Security Monitor, and Volatility Framework.
Learn to evolve penetration testing using threat intelligence and OSINT with Security BSides London. Understand how to turn threat reports into actionable tests in under 1 hour.
Dive into the basics of Elliptic Curve Cryptography (ECC) with this short, accessible program from Security BSides London. Learn how ECC protects data and networks, without the complex maths.
Get personalized course recommendations, track subjects and courses with reminders, and more.