Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Marketing
Programming Languages
Discover Dentistry
Exploring Play: The Importance of Play in Everyday Life
Mathematical Economics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to build cyber security strategies for emerging industries in Sub-Saharan Africa with Black Hat. Understand common threats and solutions in under an hour.
Explore the vulnerabilities of Diameter-based networks with Black Hat. Learn how they work, potential abuses, and ways to prevent attacks. Less than 1hr workload.
Learn about Corporate Information Security Law in this 1-2 hour material by Andrea M. Matwyshyn, offered by Black Hat.
Explore the security of autonomous vehicles and privacy of connected vehicles with Black Hat. Learn about sensor attacks, countermeasures, and location tracking in a 1-2 hour study.
Explore the role of cyber warranties in software regulation, focusing on liability for security failures. A 33-minute insight with Black Hat.
Learn to exploit access control and facility management systems with Billy Rios in this 1-2 hour material from Black Hat.
Learn about major cybersecurity threats to space systems and how to secure them in less than an hour with Black Hat's expert-led presentation.
Learn dynamic binary instrumentation techniques for dealing with obfuscated Android applications in less than an hour with Black Hat's Romain Thomas.
Learn to secure Linux applications using XOM-switch and PKU in under an hour with Black Hat's expert-led session. No source code or heavy binary rewriting required.
Learn to exploit URL parsers in popular programming languages and bypass SSRF protections with Black Hat's concise, less than 1-hour material.
Dive into QNX exploit mitigations and PRNGs for embedded systems with Black Hat. Learn about QNX's use in critical industries, its security history, and how to break its defenses.
Explore the security and privacy challenges in next-gen wearables with Black Hat's brief presentation. Learn about vulnerabilities, privacy issues, and custom Security Development Lifecycle (SDL).
Black Hat's brief session explores practical implementation of malware in SGX, demonstrating how it can stealthily steal Bitcoins, evade detection, and extract RSA keys.
Black Hat offers a brief, under 1-hour talk on "return-to-csu", a new method to bypass 64-bit Linux ASLR, applicable to any application. Includes mitigation strategies.
Learn to strengthen domain security using graphs with Black Hat's brief, under 1-hour material. Understand potential attacks and adapt your defense strategies accordingly.
Get personalized course recommendations, track subjects and courses with reminders, and more.