Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Psychology
Marketing
Python
The Emergence of the Modern Middle East - Part I
Moralities of Everyday Life
Technical Report Writing for Engineers
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to build cyber security strategies for emerging industries in Sub-Saharan Africa with Black Hat. Understand common threats and solutions in under an hour.
Explore the vulnerabilities of Diameter-based networks with Black Hat. Learn how they work, potential abuses, and ways to prevent attacks. Less than 1hr workload.
Learn about Corporate Information Security Law in this 1-2 hour material by Andrea M. Matwyshyn, offered by Black Hat.
Explore the security of autonomous vehicles and privacy of connected vehicles with Black Hat. Learn about sensor attacks, countermeasures, and location tracking in a 1-2 hour study.
Explore the role of cyber warranties in software regulation, focusing on liability for security failures. A 33-minute insight with Black Hat.
Learn to exploit access control and facility management systems with Billy Rios in this 1-2 hour material from Black Hat.
Learn about major cybersecurity threats to space systems and how to secure them in less than an hour with Black Hat's expert-led presentation.
Learn dynamic binary instrumentation techniques for dealing with obfuscated Android applications in less than an hour with Black Hat's Romain Thomas.
Explore kernel mode threats and practical defenses with Black Hat. Learn about Microsoft's OS security advancements, evasion techniques used by advanced attackers, and real-time detection methods.
Black Hat's presentation explores the security of industrial control gateways, demonstrating vulnerabilities and discussing potential fixes. Less than 1 hour.
Explore the limitations and dangers of AI and machine learning in cybersecurity with Black Hat. Learn about algorithmic biases, deep learning misapplications, and data interpretation in under 1 hour.
Explore a new vulnerability in SSO systems reliant on XML signatures with Black Hat. Learn about the threat model, exploitation, and remediation in under an hour.
Explore Windows kernel attack surfaces with Black Hat's brief, expert-led session. Learn about WNF, state scopes, sequence numbers, and more. Ideal for Windows researchers.
Explore Hyper-V architecture and vulnerabilities with Black Hat. Learn about virtualization technology, guest-to-host exploits, and secure cloud platforms in under an hour.
Learn from Gigamon's Shehzad Merchant about operationalizing a Security Operations Center, covering threat hunting, anomaly detection, and rapid product deployment. Offered by Black Hat.
Get personalized course recommendations, track subjects and courses with reminders, and more.