Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Psychology
Web Design
Introduction to Financial Accounting
Bioseguridad y equipo de protección para la prevención de COVID-19
Introducción a la gestión de proyectos
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to detect Man-in-the-Middle attacks in LANs using echo-analysis with Vesper, a novel tool, in this less than 1-hour material by Black Hat.
Learn to defend against rapidly morphing DDOS attacks with Black Hat's toolkit, focusing on mitigation and anomaly detection. Less than 1-hour workload.
Learn to use fault injection attacks on IoT processors with less than $100 of equipment in this Black Hat presentation. Tools for this will be released.
Learn the basics of cyber insurance, market dynamics, coverage terms, and the role of a CISO in the procurement process in under an hour with Black Hat.
Black Hat's brief session explores a Hyper-V vulnerability, demonstrating its exploitation on Windows Server 2012R2. Learn about bug constraints, memory layout, and sandboxing.
Learn about structured fuzzing and its role in automated vulnerability discovery in less than an hour with Black Hat. Gain practical advice and examples.
Explore RDP vulnerabilities and defense strategies with Black Hat in under an hour. Learn about poisoned RDP offense, Microsoft Terminal Services Client, and bug bounty programs.
Explore message encryption protocols and the challenges of secure corporate messaging in this under 1-hour material by Black Hat.
Learn to promote transparency in the software supply chain using SBOM in less than an hour with Black Hat. No government regulation required.
Learn techniques for remote HTTP request manipulation with Black Hat, exploring case studies and earning potential bug bounties. Less than 1-hour workload.
Explore Microsoft Office vulnerabilities and offensive techniques with Black Hat. Learn about Word and Excel security issues in less than an hour.
Explore the industry behind social media manipulation in this short, intensive talk by Black Hat. Learn about IoT botnets, traffic analysis, automation software, and more.
Learn to boot a custom firmware image on an iOS device with Black Hat. Understand the secure iOS boot process, component verification, and boot time processes in under an hour.
Explore the intriguing process of selling 0-days with Black Hat's brief yet comprehensive guide, offering insights into vulnerability brokerage and market dynamics.
Black Hat's brief, intensive exploration of 5G network security, revealing new vulnerabilities affecting operator infrastructure and end-devices.
Get personalized course recommendations, track subjects and courses with reminders, and more.