Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Communication Skills
Finance
Social Media Marketing
Herramientas de la Inteligencia de Negocios
De-Mystifying Mindfulness
Introduction to Psychology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore AI's role in phishing and defense against AI attacks with Black Hat. Learn to use AIaaS products and understand the future of AI in under an hour.
Explore cryptography bugs in BLS signatures' libraries and learn about "splitting zero" attacks with Black Hat. Less than 1 hour of material.
Explore the history and evolution of timing attacks in cryptosystems with Black Hat. Learn novel techniques resilient to network jitter in under an hour.
Black Hat's brief program guides you from creating a basic driver to controlling the user-mode network stack using unique hooking methods, with a focus on Windows rootkits.
Learn to analyze macro-based Office attacks on macOS with Black Hat's under 1-hour material, focusing on exploit code and payloads.
Explore anti-forensic techniques to hide malicious memory areas in this under 1-hour material by Black Hat. Learn novel methods to prevent malicious user space memory from appearing in analysis tools.
Black Hat's brief, intensive study on Mercedes-Benz security research, covering everything from hardware to car control. Learn about connected car security in under an hour.
Explore the threat of fault attacks and the Plundervolt solution in this Black Hat talk. Learn about cryptographic security and software-based fault attacks in under an hour.
Learn to reduce side-channel attack surfaces using deep-learning with Black Hat. Understand AI explainability, implementation, and limitations in under an hour.
Explore Samsung's baseband emulation for security testing in this less than 1-hour material by Black Hat. Learn about 2G-5G protocols, vulnerability research, and debugging interfaces.
Explore the evolution of DNS encryption and its impact on internet privacy with Black Hat's brief, expert-led session. Understand new standards like DoT and DoH.
Learn to remotely root modern Android devices, including Pixel, using the TiYunZong exploit chain in this Black Hat presentation. Understand why Pixels are tough targets and explore three new bugs.
Explore Tesla's Battery Management System (BMS) with Black Hat's under 1-hour material. Gain insights into power handling, hardware modifications, and performance improvements.
Explore deep reinforcement learning algorithms in gaming, their successes, and vulnerabilities with Black Hat. Learn to exploit AI bot blind spots in under an hour.
Explore vulnerabilities in Windows 10's SecureKernel with Black Hat. Learn to identify and fix security flaws, potentially compromising the entire VBS model, in under an hour.
Get personalized course recommendations, track subjects and courses with reminders, and more.