Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Web Development
Data Analysis
Terrorism and Counterterrorism: Comparing Theory and Practice
The Science of Happiness
Vital Signs: Understanding What the Body Is Telling Us
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to build cyber security strategies for emerging industries in Sub-Saharan Africa with Black Hat. Understand common threats and solutions in under an hour.
Explore the vulnerabilities of Diameter-based networks with Black Hat. Learn how they work, potential abuses, and ways to prevent attacks. Less than 1hr workload.
Explore the security of autonomous vehicles and privacy of connected vehicles with Black Hat. Learn about sensor attacks, countermeasures, and location tracking in a 1-2 hour study.
Learn about Corporate Information Security Law in this 1-2 hour material by Andrea M. Matwyshyn, offered by Black Hat.
Explore the role of cyber warranties in software regulation, focusing on liability for security failures. A 33-minute insight with Black Hat.
Learn to exploit access control and facility management systems with Billy Rios in this 1-2 hour material from Black Hat.
Learn about major cybersecurity threats to space systems and how to secure them in less than an hour with Black Hat's expert-led presentation.
Learn dynamic binary instrumentation techniques for dealing with obfuscated Android applications in less than an hour with Black Hat's Romain Thomas.
Explore the PE format with Black Hat's brief research presentation, offering insights into PE loaders, reverse-engineering tasks, and malware hunting. Less than 1-hour workload.
Explore mobile wallet security flaws with Black Hat's under 1-hour material. Learn about fraud against Apple Pay, Google Pay, and Samsung Pay, and how to protect yourself.
Explore Android kernel vulnerabilities with Black Hat's brief, intensive study. Learn to exploit Use-After-Free vulnerability (CVE-2021-0399) in the xt_qtaguid kernel module.
Explore Linux kernel security with Black Hat, focusing on USB-based attacks and exploiting a forgotten vulnerability (CVE-2016-2384). Less than 1-hour workload.
Explore WiFi security protocols and their flaws with Black Hat's brief, expert-led program. Learn about WiFi attack surfaces, protocol stacks, and fuzzing strategies.
Learn about cloud-specific cyber attacks, AWS credential theft, and innovative exploitation techniques in less than an hour with Black Hat.
Explore VPN exploits in the era of teleworking with Black Hat's brief, under 1-hour material. Learn about Pulse Secure misuse, cyber espionage, and incident response.
Get personalized course recommendations, track subjects and courses with reminders, and more.