Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Data Analysis
Artificial Intelligence
Protecting Business Innovations via Patent
Viral Marketing and How to Craft Contagious Content
Discover Dentistry
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Black Hat. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn to build cyber security strategies for emerging industries in Sub-Saharan Africa with Black Hat. Understand common threats and solutions in under an hour.
Explore the vulnerabilities of Diameter-based networks with Black Hat. Learn how they work, potential abuses, and ways to prevent attacks. Less than 1hr workload.
Learn dynamic binary instrumentation techniques for dealing with obfuscated Android applications in less than an hour with Black Hat's Romain Thomas.
Explore the security of autonomous vehicles and privacy of connected vehicles with Black Hat. Learn about sensor attacks, countermeasures, and location tracking in a 1-2 hour study.
Learn about Corporate Information Security Law in this 1-2 hour material by Andrea M. Matwyshyn, offered by Black Hat.
Learn to exploit access control and facility management systems with Billy Rios in this 1-2 hour material from Black Hat.
Learn about major cybersecurity threats to space systems and how to secure them in less than an hour with Black Hat's expert-led presentation.
Explore the role of cyber warranties in software regulation, focusing on liability for security failures. A 33-minute insight with Black Hat.
Explore Windows system vulnerabilities and mitigation strategies with Black Hat's brief, intensive study. Learn to exploit a 0-day logic vulnerability, bypassing all current mitigations.
Explore Android PendingIntent vulnerabilities with Black Hat's concise program. Learn to identify insecure PendingIntents, exploit them, and implement security measures.
Explore IPV6 scanning vulnerabilities with Black Hat's concise program. Learn to effectively scan or obtain IPV6 addresses in under an hour.
Explore the Titan M chip's role in Android device security with Black Hat. Learn about its features, operation, and potential vulnerabilities in under an hour.
Explore the security of e-book reading systems with Black Hat's brief, under 1-hour study. Learn about EPUB compliance, JavaScript support, and case studies on popular platforms.
Black Hat offers a brief, intensive study on hardware attacks against AMD's Secure Processor, covering fault injection, analysis, and attack cycles.
Explore the PE format with Black Hat's brief research presentation, offering insights into PE loaders, reverse-engineering tasks, and malware hunting. Less than 1-hour workload.
Get personalized course recommendations, track subjects and courses with reminders, and more.