Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Communication Skills
Computer Networking
Astrobiology and the Search for Extraterrestrial Life
Introduction to Computer Science and Programming Using Python
Understanding Multiple Sclerosis (MS)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the development of privacy and security labels for IoT devices with the USENIX Enigma Conference. Learn about consumer concerns and the process of creating informative labels.
Explore the state of global privacy with data from 90,000+ respondents in this short talk by Google's Patrick Gage Kelley, offered by USENIX Enigma Conference.
Explore the journey of online voting in Switzerland, its security issues, and the government's response with USENIX Enigma's under 1-hour material.
Explore the design of verifiable health solutions for pandemics in this short program by USENIX Enigma Conference. Learn about lab test results, vaccination history, and public safety considerations.
Explore unique cybersecurity threats in Brazil with USENIX Enigma's short program. Learn from a dataset of 40k malware samples and understand the need for personalized threat models.
Explore the impact of memory unsafety in C and C++ with USENIX Enigma Conference. Learn about vulnerability types, developer reactions, and tactics for secure development.
Learn to detect fake 4G LTE base stations in real-time with open-source software and affordable hardware, offered by USENIX Enigma Conference.
Learn from shark conservation strategies to influence public discourse in security and privacy, without emotional manipulation or fear. Offered by USENIX Enigma Conference.
Explore software supply chain security with USENIX Enigma Conference. Understand its implications, learn from past attacks, and discover strategies for improvement in under an hour.
Explore hardware's role in system security, its vulnerabilities, and solutions with real-world examples in this short program by USENIX Enigma Conference.
Explore the vulnerabilities of machine learning models to hardware attacks with the USENIX Enigma Conference. Learn about fault-injection and side-channel attacks, and the need for robust defenses.
Explore the limits of sandboxing with Google Chrome Security's Chris Palmer, learn about the need for additional security mechanisms, and delve into memory safety in this short USENIX Enigma Conference presentation.
Learn about bringing usable crypto to developers with MongoDB's Kenn White in this short USENIX Enigma Conference session. Explore client-side encryption, emerging cryptography, and practical impacts.
Learn to defend against firmware attacks with Facebook's Teddy Reed. This USENIX Enigma Conference material covers detection, response, and system defense strategies in under an hour.
Explore the evolution of automotive security, understand software vulnerabilities in car firmware, and learn about industry responses with this less than 1-hour material from USENIX Enigma Conference.
Get personalized course recommendations, track subjects and courses with reminders, and more.