Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Psychology
Marketing
Graphic Design
Mindfulness for Wellbeing and Peak Performance
Whole genome sequencing of bacterial genomes - tools and applications
Competencias para buscar, mantener y promocionar en un empleo
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the vulnerabilities of automated 4G/LTE networks with Black Hat's brief, under 1-hour material. Learn about rogue base stations, malicious packet injections, and potential solutions.
Learn to restore deleted files using Windows' Volume Shadow Copy Service (VSS) in this brief, forensic-focused offering from Black Hat.
Explore kernel mode threats and practical defenses with Black Hat. Learn about Microsoft's OS security advancements, evasion techniques used by advanced attackers, and real-time detection methods.
Black Hat's presentation explores the security of industrial control gateways, demonstrating vulnerabilities and discussing potential fixes. Less than 1 hour.
Explore the limitations and dangers of AI and machine learning in cybersecurity with Black Hat. Learn about algorithmic biases, deep learning misapplications, and data interpretation in under 1 hour.
Explore a new vulnerability in SSO systems reliant on XML signatures with Black Hat. Learn about the threat model, exploitation, and remediation in under an hour.
Explore Windows kernel attack surfaces with Black Hat's brief, expert-led session. Learn about WNF, state scopes, sequence numbers, and more. Ideal for Windows researchers.
Explore Hyper-V architecture and vulnerabilities with Black Hat. Learn about virtualization technology, guest-to-host exploits, and secure cloud platforms in under an hour.
Learn from Gigamon's Shehzad Merchant about operationalizing a Security Operations Center, covering threat hunting, anomaly detection, and rapid product deployment. Offered by Black Hat.
Explore the Meltdown security vulnerability with Black Hat, understanding how it breaks isolation between user apps and the OS in under an hour.
Explore the inner workings of JavaScript JIT compilers with a focus on security in this less than 1-hour material by Black Hat. Learn about challenges, solutions, and bug categories.
Explore electromagnetic side-channel attacks and cryptography in mixed-design chips with Black Hat. Learn about radio signal leaks, correlation attacks, and countermeasures in under 1 hour.
Learn to secure Linux applications using XOM-switch and PKU in under an hour with Black Hat's expert-led session. No source code or heavy binary rewriting required.
Learn to exploit URL parsers in popular programming languages and bypass SSRF protections with Black Hat's concise, less than 1-hour material.
Dive into QNX exploit mitigations and PRNGs for embedded systems with Black Hat. Learn about QNX's use in critical industries, its security history, and how to break its defenses.
Get personalized course recommendations, track subjects and courses with reminders, and more.