Courses from 1000+ universities
A human analysis of financial documents reveals what AI content farms missed: Duolingo’s GenAI features are undermining its own profit margins.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Algorithms and Data Structures
EU policy and implementation: making Europe work!
Fibonacci Numbers and the Golden Ratio
English in Early Childhood: Language Learning and Development
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ONR's cyber research strategy, focusing on resilient systems, software complexity, and future heterogeneous computing. Learn about funding opportunities in naval cybersecurity.
Learn essential operational security concepts, from browser fingerprinting to privacy threats, and explore strategies to protect your digital identity in today's interconnected world.
Explore a stealthy lateral movement strategy for cybersecurity, focusing on the novel ShadowMove technique, its architecture, implementation, and potential impact on network security.
Explore innovative techniques for securing CAN-based cyber-physical systems against denial and spoofing attacks, focusing on the CANSentry approach and its implementation.
Explore advertising technology, tracking methods, and mitigation strategies for Android and iOS devices in this informative session on digital privacy and security.
Explore database security through workload modeling, focusing on performance metrics, behavioral patterns, and insider threat detection techniques.
Explore security threats in crowdsourcing, analyze research findings, and learn strategies for protecting data integrity and quality control in online surveys and annotations.
Explore intrusion detection systems in resource-limited settings, focusing on host-based and network-based IDS, data gathering, testing environments, and performance analysis.
Explore the human element in cybersecurity, focusing on cognitive hacking techniques, human limitations, and strategies to enhance human performance in defending against cyber threats.
Explore AI's role in cybersecurity, focusing on advanced persistent threats, intrusion detection systems, and vulnerability analysis using ontologies and reasoning techniques.
Explore techniques for adversarial attacks on speech recognition systems, focusing on Amazon Echo and Kodi. Learn about blackbox approaches and philosophical implications.
Explore secure execution intervals and reboot strategies for cyber-physical systems. Learn about the Resecure framework and custom base extensions for Arm processors to enhance security.
Comprehensive overview of Armitage and Metasploit for penetration testing, covering information gathering, exploitation, and post-exploitation techniques through live demonstrations and practical examples.
Explore challenges and solutions for securing big data in AI, including hardware support, federated learning, and privacy-preserving techniques for data science and machine learning.
Explore Kubernetes security vulnerabilities, attacks, and best practices. Learn about threat models, misconfigurations, and potential risks in cluster deployments.
Get personalized course recommendations, track subjects and courses with reminders, and more.