Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Data Analysis
Artificial Intelligence
Protecting Business Innovations via Patent
Viral Marketing and How to Craft Contagious Content
Discover Dentistry
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore vulnerabilities in Building Management Systems (BMS) with Hack In The Box Security Conference. Learn to identify and exploit security flaws, potentially affecting millions. Less than 1 hour.
Learn about exploitation techniques and attacks on network systems, with insights from real-life examples and case studies. Offered by Hack In The Box Security Conference, this less than 1-hour material provides a unique view on attacker exploitation tec…
Explore critical infrastructure data breaches with Hack In The Box Security Conference. Learn about data leaks, their impact, and prevention measures in less than an hour.
Learn to exploit kernel vulnerabilities using a filesystem fuzzer, JANUS, in this under 1-hour material from Hack In The Box Security Conference. Gain deep understanding of filesystem codebase and kernel exploit techniques.
Explore the security of acquiring bank infrastructures with Hack In The Box Security Conference. Learn about Terminal Management Systems, potential misconfigurations, and attacks in under 1 hour.
Dive into SAP security with Hack In The Box Security Conference's online material. Learn about SAP applications, bypassing authentication, privilege escalation, and mitigating vulnerabilities in under an hour.
Learn to exploit vulnerabilities in Jenkins, the open-source automation server, with this under 1-hour material from Hack In The Box Security Conference. Gain insights from CyberArk Labs researcher, Nimrod Stoler.
Learn about critical vulnerabilities in ERP systems used by Fortune-500 companies, with a focus on Oracle's ERP, in this 1-2 hour material from Hack In The Box Security Conference.
Explore the analysis of advanced persistent threat attacks on the semiconductor industry, focusing on Taiwan's sector, with Hack In The Box Security Conference. Learn about Operation SemiChimera, threat actors, and improve cybersecurity.
Learn about supply chain attacks from Hack In The Box Security Conference. Understand strategies used by the BARIUM APT group, analyze various cases, and explore defensive strategies. Less than 1hr.
Explore the limitations of automated software vulnerability mining technology with Hack In The Box Security Conference. Learn to use tools like libFuzzer, AFL, KLEE, QSYM, and understand the gap between these technologies and manual code review.
Explore common flaws in ICS network protocols with Mars Cheng & Selmon Yang in this short program by Hack In The Box Security Conference. Learn about public and private ICS protocols, their risks, and potential attacks.
Explore DevSecOps and Chaos Security Engineering with Eddie Schwartz, CSO at block.one, in this brief Hack In The Box Security Conference session. Learn to integrate business, development, and security teams effectively.
Explore malware analysis with Denis Legezo from Hack In The Box Security Conference. Learn about HTTP statuses as C2 commands, compromised TLS, and system process memory injection in under 1 hour.
Explore serverless security with Hack In The Box Security Conference. Learn about attack vectors, validation errors, insecure defaults, and prevention methods in less than an hour.
Get personalized course recommendations, track subjects and courses with reminders, and more.