Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Development
Marketing
Programming Languages
The Analytics Edge
Competitive Strategy
Learning How to Learn: Powerful mental tools to help you master tough subjects
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to build cyber security strategies for emerging industries in Sub-Saharan Africa with Black Hat. Understand common threats and solutions in under an hour.
Explore the vulnerabilities of Diameter-based networks with Black Hat. Learn how they work, potential abuses, and ways to prevent attacks. Less than 1hr workload.
Explore the security of autonomous vehicles and privacy of connected vehicles with Black Hat. Learn about sensor attacks, countermeasures, and location tracking in a 1-2 hour study.
Learn about Corporate Information Security Law in this 1-2 hour material by Andrea M. Matwyshyn, offered by Black Hat.
Explore the role of cyber warranties in software regulation, focusing on liability for security failures. A 33-minute insight with Black Hat.
Learn to exploit access control and facility management systems with Billy Rios in this 1-2 hour material from Black Hat.
Learn about major cybersecurity threats to space systems and how to secure them in less than an hour with Black Hat's expert-led presentation.
Learn dynamic binary instrumentation techniques for dealing with obfuscated Android applications in less than an hour with Black Hat's Romain Thomas.
Black Hat's brief talk provides an in-depth security analysis of the voting software used in Brazilian elections, highlighting vulnerabilities and potential solutions.
Learn practical memory forensics to detect and investigate malware with Black Hat's 1-2 hour program, featuring demonstrations and techniques to understand malicious software capabilities.
Learn practical guidance on database encryption for high-sensitivity workloads from Black Hat. Dive into threat models, production ops, and emerging methods in under an hour.
Explore how Windows 10's security questions can be exploited for persistence in this under 1-hour session by Black Hat. Learn about LSA secrets, remote implementations, and safety recommendations.
Explore IoT malware with Black Hat's concise program. Learn about its history, vulnerability details, analysis process, and case studies in under an hour.
Black Hat's brief introduction to WebAssembly, covering its low-level semantics, security risks, and practical applications. Less than 1 hour of material.
Learn to compromise websites using cache features with Black Hat's under 1-hour session. Explore cache poisoning methodology, resource hijacking, and defense strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.