Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Psychology
Digital Skills
Graphic Design
Modelli di insegnamento nella ricerca educativa
Technical Report Writing for Engineers
Making Successful Decisions through the Strategy, Law & Ethics Model
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to build cyber security strategies for emerging industries in Sub-Saharan Africa with Black Hat. Understand common threats and solutions in under an hour.
Explore the role of cyber warranties in software regulation, focusing on liability for security failures. A 33-minute insight with Black Hat.
Explore the vulnerabilities of Diameter-based networks with Black Hat. Learn how they work, potential abuses, and ways to prevent attacks. Less than 1hr workload.
Learn about Corporate Information Security Law in this 1-2 hour material by Andrea M. Matwyshyn, offered by Black Hat.
Explore the security of autonomous vehicles and privacy of connected vehicles with Black Hat. Learn about sensor attacks, countermeasures, and location tracking in a 1-2 hour study.
Learn to exploit access control and facility management systems with Billy Rios in this 1-2 hour material from Black Hat.
Learn about major cybersecurity threats to space systems and how to secure them in less than an hour with Black Hat's expert-led presentation.
Learn dynamic binary instrumentation techniques for dealing with obfuscated Android applications in less than an hour with Black Hat's Romain Thomas.
Explore eBPF technology and its kernel layer performance capabilities in this less than 1-hour material by Black Hat. Learn to load programs into kernel space without modifying the kernel source code.
Learn about the privacy risks in fitness tracking social networks and how to mitigate them in this less than 1-hour material by Black Hat.
Explore the new attack surface in Java applications with Black Hat. Learn about Java Database Connectivity (JDBC) and cloud data platforms in under an hour.
Explore how mobile devices get pre-infected with malicious firmware in this less than 1-hour presentation by Black Hat. Dive into the operations of criminal enterprises targeting mobile phones.
Learn about the security of the WebAssembly compiler in web browsers with Black Hat. Understand vulnerabilities and protection measures in less than an hour.
Learn to navigate Azure Active Directory's security in under an hour with Black Hat, focusing on MFA bypass and global administrator listing.
Learn about supply chain vulnerabilities in cloud development from an attacker's perspective in this less than 1-hour material by Black Hat.
Get personalized course recommendations, track subjects and courses with reminders, and more.