Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Programming Languages
Digital Marketing
Maintaining a Mindful Life
End of Life Care: Challenges and Innovation
Improving Healthcare Through Clinical Research
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the security implications of HTTP/2 with Black Hat. Unearth implementation flaws and learn about desync attacks in less than an hour.
Learn to understand and bypass Windows Defender's signatures with Black Hat's under 1-hour material, presented by Camille Mougey. Explore antivirus internals, test skills, and study ASR rules.
Explore new attack surfaces of Wi-Fi Mesh networks in this under 1-hour session by Black Hat. Learn about IoT infrastructure, EasyMesh, and network security principles.
Explore TensorFlow vulnerabilities with Black Hat's concise program. Learn about API fuzzing, semantic context, and a new fuzzing approach for machine learning frameworks.
Join Black Hat's brief session on cloud vulnerabilities, led by the Wiz Research Team. Learn about key issues in AWS, GCP, Azure, and the need for a cloud-friendly CVE model.
Learn about Magecart vulnerabilities, their impact on global enterprises, and defense mechanisms in this under 1-hour material by Black Hat.
Learn to defend against remote RPC attacks in Windows environments with Black Hat's brief, under 1-hour material by Sagie Dulce.
Explore the economics of ransomware negotiation with Black Hat. Learn to think like an attacker, understand negotiation strategies, and manage digital extortion in under 1 hour.
Explore Windows system vulnerabilities and mitigation strategies with Black Hat's brief, intensive study. Learn to exploit a 0-day logic vulnerability, bypassing all current mitigations.
Explore Android PendingIntent vulnerabilities with Black Hat's concise program. Learn to identify insecure PendingIntents, exploit them, and implement security measures.
Explore IPV6 scanning vulnerabilities with Black Hat's concise program. Learn to effectively scan or obtain IPV6 addresses in under an hour.
Explore the Titan M chip's role in Android device security with Black Hat. Learn about its features, operation, and potential vulnerabilities in under an hour.
Explore the security of e-book reading systems with Black Hat's brief, under 1-hour study. Learn about EPUB compliance, JavaScript support, and case studies on popular platforms.
Black Hat offers a brief, intensive study on hardware attacks against AMD's Secure Processor, covering fault injection, analysis, and attack cycles.
Explore the PE format with Black Hat's brief research presentation, offering insights into PE loaders, reverse-engineering tasks, and malware hunting. Less than 1-hour workload.
Get personalized course recommendations, track subjects and courses with reminders, and more.