Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Language Learning
Finance
Microsoft Excel
A Scuola con Raffaello
Uncommon Sense Teaching
Justice
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to detect fake 4G LTE base stations in real-time with open-source software and affordable hardware, offered by USENIX Enigma Conference.
Learn from shark conservation strategies to influence public discourse in security and privacy, without emotional manipulation or fear. Offered by USENIX Enigma Conference.
Explore software supply chain security with USENIX Enigma Conference. Understand its implications, learn from past attacks, and discover strategies for improvement in under an hour.
Explore hardware's role in system security, its vulnerabilities, and solutions with real-world examples in this short program by USENIX Enigma Conference.
Explore the vulnerabilities of machine learning models to hardware attacks with the USENIX Enigma Conference. Learn about fault-injection and side-channel attacks, and the need for robust defenses.
Explore the limits of sandboxing with Google Chrome Security's Chris Palmer, learn about the need for additional security mechanisms, and delve into memory safety in this short USENIX Enigma Conference presentation.
Learn about bringing usable crypto to developers with MongoDB's Kenn White in this short USENIX Enigma Conference session. Explore client-side encryption, emerging cryptography, and practical impacts.
Explore data anonymization and its risks with Matt Bishop from UC Davis, in this short USENIX Enigma Conference session. Learn about relationships in data and how they can be exploited.
Explore the intersection of economics and cybersecurity with this USENIX Enigma Conference presentation. Understand why people neglect security measures and learn about incentive-aligned design.
Explore the state of stalkerware with EFF's Eva Galperin in this USENIX Enigma Conference session. Learn about combating stalkerware, supporting victims, and enhancing privacy.
Explore cell network attacks and their root causes in this short program by USENIX Enigma Conference. Learn about IMSI-catcher, spoofing, and efforts to improve cell network security.
Explore Google's cloud-native security architecture, BeyondProd, in this short program by USENIX Enigma Conference. Learn about microservices, security design principles, and Google's internal tools.
Explore internet abuse detection strategies with Facebook's David Freeman in this USENIX Enigma Conference talk. Learn about measuring abuse, prioritizing work, and the "Abuse Uncertainty Principle".
Explore the challenges of trustworthy elections in the USA with the USENIX Enigma Conference. Learn about the Microsoft ElectionGuard project and DARPA SSITH project in under an hour.
Explore secure voting systems and modern threats with Ben Adida at the USENIX Enigma Conference. Learn about online voting, blockchain, and more in under an hour.
Get personalized course recommendations, track subjects and courses with reminders, and more.