Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Information Technology
Python
Aprender
The Emergence of the Modern Middle East - Part I
Ecology and Wildlife Conservation
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the world of anti-cheats with Black Hat, from market analysis to technique analysis. Less than 1 hour of engaging content.
Learn to secure intelligent electronic devices with IEC 62351 and SNMP in less than an hour with Black Hat and Nozomi Networks.
Explore iOS and Mac security with Black Hat's brief program. Learn about the Find My feature, elliptic curve key diversification, and data protection. Understand how to protect userland integrity and locate offline devices.
Learn to detect Man-in-the-Middle attacks in LANs using echo-analysis with Vesper, a novel tool, in this less than 1-hour material by Black Hat.
Learn to defend against rapidly morphing DDOS attacks with Black Hat's toolkit, focusing on mitigation and anomaly detection. Less than 1-hour workload.
Learn to use fault injection attacks on IoT processors with less than $100 of equipment in this Black Hat presentation. Tools for this will be released.
Learn the basics of cyber insurance, market dynamics, coverage terms, and the role of a CISO in the procurement process in under an hour with Black Hat.
Black Hat's brief session explores a Hyper-V vulnerability, demonstrating its exploitation on Windows Server 2012R2. Learn about bug constraints, memory layout, and sandboxing.
Learn about structured fuzzing and its role in automated vulnerability discovery in less than an hour with Black Hat. Gain practical advice and examples.
Explore RDP vulnerabilities and defense strategies with Black Hat in under an hour. Learn about poisoned RDP offense, Microsoft Terminal Services Client, and bug bounty programs.
Explore message encryption protocols and the challenges of secure corporate messaging in this under 1-hour material by Black Hat.
Learn to promote transparency in the software supply chain using SBOM in less than an hour with Black Hat. No government regulation required.
Learn techniques for remote HTTP request manipulation with Black Hat, exploring case studies and earning potential bug bounties. Less than 1-hour workload.
Explore Microsoft Office vulnerabilities and offensive techniques with Black Hat. Learn about Word and Excel security issues in less than an hour.
Explore the industry behind social media manipulation in this short, intensive talk by Black Hat. Learn about IoT botnets, traffic analysis, automation software, and more.
Get personalized course recommendations, track subjects and courses with reminders, and more.