Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Information Technology
Software Development
Exploring English: Language and Culture
Marketing Digital: Content & Community Manager
Perdón y reconciliación: cómo sanar heridas
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into QNX exploit mitigations and PRNGs for embedded systems with Black Hat. Learn about QNX's use in critical industries, its security history, and how to break its defenses.
Explore the security and privacy challenges in next-gen wearables with Black Hat's brief presentation. Learn about vulnerabilities, privacy issues, and custom Security Development Lifecycle (SDL).
Black Hat's brief session explores practical implementation of malware in SGX, demonstrating how it can stealthily steal Bitcoins, evade detection, and extract RSA keys.
Black Hat offers a brief, under 1-hour talk on "return-to-csu", a new method to bypass 64-bit Linux ASLR, applicable to any application. Includes mitigation strategies.
Learn to strengthen domain security using graphs with Black Hat's brief, under 1-hour material. Understand potential attacks and adapt your defense strategies accordingly.
Learn to safeguard air-gapped ICS/SCADA networks from autonomous malware with Black Hat's under 1-hour material, covering network topology, industrial devices, and sensitive IP.
Explore VMWare VM escape vulnerabilities with Black Hat's concise study, analyzing patches and attack surfaces. Learn about RPC mechanisms, bug handling, and virtual GPU vulnerabilities.
Learn to initiate Threat Hunting in your organization with Black Hat's under 1-hour material. Understand data analysis, hypothesis generation, and forensic artifact examination.
Explore Google's primary security platform, SafetyNet, with Black Hat's 1-2 hour material. Learn about Android OS tampering, device integrity detection, and SafetyNet Attestation service.
Explore GSMA's eUICC security vulnerabilities in this under 1-hour material by Black Hat. Learn about SIM cards, remote provisioning, and potential attacks.
Learn to secure networks by emulating adversary techniques with Black Hat's under 1-hour program. Gain insights into adversarial assessment, system functionality, and open-source tools.
Learn to identify vulnerabilities in Android/Linux kernel driver code with Black Hat's concise material, focusing on static analysis, fuzzing, and bug handling.
Explore the CLKSCREW attack and its implications on security with Black Hat. Learn how energy management mechanisms can be exploited, without needing physical access to devices.
Explore the risks and benefits of IoT in healthcare with Black Hat's brief, focusing on data security in connected medical devices.
Explore Intel ME 11.x's flash storage system in under an hour with Black Hat. Learn about file systems, flash memory characteristics, and system security.
Get personalized course recommendations, track subjects and courses with reminders, and more.