Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Language Learning
Software Development
Graphic Design
Greek and Roman Mythology
Computational Social Science Methods
Bioseguridad y equipo de protección para la prevención de COVID-19
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Black Hat. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn to build cyber security strategies for emerging industries in Sub-Saharan Africa with Black Hat. Understand common threats and solutions in under an hour.
Learn dynamic binary instrumentation techniques for dealing with obfuscated Android applications in less than an hour with Black Hat's Romain Thomas.
Learn about major cybersecurity threats to space systems and how to secure them in less than an hour with Black Hat's expert-led presentation.
Explore the security of autonomous vehicles and privacy of connected vehicles with Black Hat. Learn about sensor attacks, countermeasures, and location tracking in a 1-2 hour study.
Learn to exploit access control and facility management systems with Billy Rios in this 1-2 hour material from Black Hat.
Learn about Corporate Information Security Law in this 1-2 hour material by Andrea M. Matwyshyn, offered by Black Hat.
Explore the vulnerabilities of Diameter-based networks with Black Hat. Learn how they work, potential abuses, and ways to prevent attacks. Less than 1hr workload.
Explore the role of cyber warranties in software regulation, focusing on liability for security failures. A 33-minute insight with Black Hat.
Learn from Black Hat Review Board member, Stefano Zanero, how to avoid common mistakes in research submissions and increase your chances of being accepted as a speaker at industry events.
Learn to detect interference attacks in power line communication systems using G3 or Prime standards with Black Hat. Less than 1-hour workload.
Learn to identify Flash player 0-Day attacks with Black Hat's concise guide. Discover effective sample collection methods and tools for low false positive detection in under an hour.
Black Hat's online program offers insights into using open-source tools for data collection, storage, and visualization in security contexts. Learn to automate threat identification and response.
Learn to identify and exploit Android app vulnerabilities with Black Hat's concise program. Gain skills in static analysis and creating malicious payloads. Less than 1 hour workload.
Learn to identify web application platforms through PNG fingerprinting with Black Hat's under 1-hour material. Ideal for security audits and forensic investigations.
Learn about the implementation of deniable encryption in under an hour with Black Hat's concise program, featuring core technology and practical examples.
Get personalized course recommendations, track subjects and courses with reminders, and more.