Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a novel framework for cross-language taint-flow analysis, enabling detection of critical security vulnerabilities across multiple codebases and programming languages.
Learn strategies to quantify cybersecurity effectiveness, determine ROI, and communicate results from the security trenches to the boardroom, addressing a key industry challenge.
Insightful discussion on pressing InfoSec issues, trends, and future strategies by Black Hat Asia Review Board members, covering topics like stress testing, sanctions, governance, and emerging technologies.
Explore the impact of digital technologies on democratic societies and the challenges they pose to governance, social cohesion, and political stability in this thought-provoking keynote.
Explore the aggressive SideWinder threat actor's tactics, infection chain, and infrastructure. Learn about their evolving techniques and effective mitigation strategies.
Explore the emerging Pangolin8RAT trojan, its potential as a successor to PlugX and ShadowPad in Chinese cyber operations, and its attack timeline from 2020 to 2021.
Explore evolving approaches to vulnerability disclosure in critical software, emphasizing early cooperation between researchers and vendors for improved security outcomes.
Innovative technique for rehosting embedded Linux kernels in QEMU using peripheral transplantation, enabling dynamic analysis of firmware images from diverse embedded devices.
Explore Android PendingIntent vulnerabilities in high-profile apps, learn exploitation techniques, and discover security implications for developers and system integrity.
Explore the evolution of Black Hat's Network Operations Center, adapting to virtual events while maintaining security. Learn about infrastructure, tools, and challenges in managing a notorious network.
Explore behavioral psychology insights to improve CSIRT effectiveness, addressing team dynamics, communication, and collaboration challenges for enhanced incident response.
Explore Linux's IPC attack surface, focusing on systemd and dbus-daemon. Discover vulnerabilities in system services and learn about potential security risks in Linux's userspace processes.
Explore the need for transparency in security machine learning, discussing challenges, benefits, and strategies for fostering openness to drive real progress in the field.
Uncover a critical WebKit vulnerability that compromises authentication and authorization in web applications, exposing weaknesses in browser security features and their implementation.
Explore new Active Directory protocol injection attacks, focusing on NTLM and Kerberos vulnerabilities. Learn about attack scenarios, mitigation strategies, and essential tips for defenders.
Get personalized course recommendations, track subjects and courses with reminders, and more.