Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Web Development
Cybersecurity
Artificial Intelligence
CS50's Introduction to Computer Science
Molecular Biology - Part 1: DNA Replication and Repair
Know Thyself - The Value and Limits of Self-Knowledge: The Examined Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Black Hat. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn to build cyber security strategies for emerging industries in Sub-Saharan Africa with Black Hat. Understand common threats and solutions in under an hour.
Explore the vulnerabilities of Diameter-based networks with Black Hat. Learn how they work, potential abuses, and ways to prevent attacks. Less than 1hr workload.
Learn dynamic binary instrumentation techniques for dealing with obfuscated Android applications in less than an hour with Black Hat's Romain Thomas.
Learn to exploit access control and facility management systems with Billy Rios in this 1-2 hour material from Black Hat.
Explore the security of autonomous vehicles and privacy of connected vehicles with Black Hat. Learn about sensor attacks, countermeasures, and location tracking in a 1-2 hour study.
Learn about major cybersecurity threats to space systems and how to secure them in less than an hour with Black Hat's expert-led presentation.
Learn about Corporate Information Security Law in this 1-2 hour material by Andrea M. Matwyshyn, offered by Black Hat.
Explore the role of cyber warranties in software regulation, focusing on liability for security failures. A 33-minute insight with Black Hat.
Learn about self-concealing, perfectly deniable encryption/steganography suite similar to VeraCrypt's hidden volume/OS feature from Black Hat. Less than 1-hour workload.
Learn to exploit electronic systems using resonance frequencies in less than an hour with Black Hat's expert, Ivan Reedman.
Black Hat's brief talk provides an in-depth security analysis of the voting software used in Brazilian elections, highlighting vulnerabilities and potential solutions.
Learn practical memory forensics to detect and investigate malware with Black Hat's 1-2 hour program, featuring demonstrations and techniques to understand malicious software capabilities.
Learn practical guidance on database encryption for high-sensitivity workloads from Black Hat. Dive into threat models, production ops, and emerging methods in under an hour.
Explore how Windows 10's security questions can be exploited for persistence in this under 1-hour session by Black Hat. Learn about LSA secrets, remote implementations, and safety recommendations.
Explore IoT malware with Black Hat's concise program. Learn about its history, vulnerability details, analysis process, and case studies in under an hour.
Get personalized course recommendations, track subjects and courses with reminders, and more.