Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Marketing
Programming Languages
Discover Dentistry
Exploring Play: The Importance of Play in Everyday Life
Mathematical Economics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Black Hat. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore Android PendingIntent vulnerabilities with Black Hat's concise program. Learn to identify insecure PendingIntents, exploit them, and implement security measures.
Explore IPV6 scanning vulnerabilities with Black Hat's concise program. Learn to effectively scan or obtain IPV6 addresses in under an hour.
Explore the Titan M chip's role in Android device security with Black Hat. Learn about its features, operation, and potential vulnerabilities in under an hour.
Explore the security of e-book reading systems with Black Hat's brief, under 1-hour study. Learn about EPUB compliance, JavaScript support, and case studies on popular platforms.
Black Hat offers a brief, intensive study on hardware attacks against AMD's Secure Processor, covering fault injection, analysis, and attack cycles.
Explore the PE format with Black Hat's brief research presentation, offering insights into PE loaders, reverse-engineering tasks, and malware hunting. Less than 1-hour workload.
Explore mobile wallet security flaws with Black Hat's under 1-hour material. Learn about fraud against Apple Pay, Google Pay, and Samsung Pay, and how to protect yourself.
Explore Android kernel vulnerabilities with Black Hat's brief, intensive study. Learn to exploit Use-After-Free vulnerability (CVE-2021-0399) in the xt_qtaguid kernel module.
Explore Linux kernel security with Black Hat, focusing on USB-based attacks and exploiting a forgotten vulnerability (CVE-2016-2384). Less than 1-hour workload.
Explore WiFi security protocols and their flaws with Black Hat's brief, expert-led program. Learn about WiFi attack surfaces, protocol stacks, and fuzzing strategies.
Learn about cloud-specific cyber attacks, AWS credential theft, and innovative exploitation techniques in less than an hour with Black Hat.
Explore VPN exploits in the era of teleworking with Black Hat's brief, under 1-hour material. Learn about Pulse Secure misuse, cyber espionage, and incident response.
Learn to exploit web application vulnerabilities through HTTP header smuggling with Black Hat. Understand web architecture, mutation examples, and defense strategies in under an hour.
Learn to exploit Microsoft's Active Directory Certificate Services for credential theft and domain escalation in under an hour with Black Hat.
Explore Black Hat's brief study on attacking Windows Hello's face recognition, learning how to bypass it using a crafted USB device.
Get personalized course recommendations, track subjects and courses with reminders, and more.