Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Programming Languages
Digital Marketing
Digital Skills
Constitutional Interpretation
Introduction to Philosophy
Learning How to Learn: Powerful mental tools to help you master tough subjects
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from USENIX Security. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn to detect audio deepfakes using articulatory phonetics techniques in this short program by USENIX, achieving a recall of 99.5% in deepfake identification.
Explore efficient code-reuse attacks against Intel SGX, with novel techniques that don't require kernel privileges. Offered by USENIX, it takes less than an hour.
Explore Facebook's exploitation of sensitive data for advertising in this short study by USENIX, featuring a web browser extension to inform users of potential data risks.
Explore email encryption vulnerabilities with USENIX's brief study on breaking S/MIME and OpenPGP using exfiltration channels. Learn about malleability gadgets, backchannel techniques, and more.
Explore USENIX's framework for secure neural network inference, Gazelle, combining homomorphic encryption and two-party computation techniques. Less than 1-hour workload.
Learn to optimize OS fuzzer seed selection with MoonShine, a strategy developed by USENIX. Understand system call dependencies, trace distillation, and improve Linux kernel code coverage.
Learn to facilitate exploit generation for kernel UAF vulnerabilities with FUZE, a new framework by USENIX. This less than 1-hour material covers kernel fuzzing and symbolic execution.
Explore hybrid fuzzing with QSYM, a fast concolic execution engine, in this short USENIX program. Learn to overcome limitations of fuzzing and concolic execution in real-world software.
Explore the challenges of stopping cache attacks in software with USENIX's concise study, focusing on indirect cache attacks and the limitations of existing defense techniques.
Explore USENIX's under-1-hour material on NetHide, a framework that obfuscates network topologies to mitigate advanced DoS attacks while preserving debugging tools' practicality.
Learn to reverse engineer Ethereum's smart contracts with Erays, a tool developed by USENIX. Understand code complexity, reuse, and link contracts to public source code.
Explore the challenges of ethical computing and security in tech with Harvard's James Mickens in this USENIX offering. Less than 1-hour commitment.
Explore USENIX's unique study on Lamphone, an optical side-channel attack that recovers sound from light bulb vibrations, in less than an hour.
Explore USENIX's study on model inversion attacks in machine learning, focusing on privacy risks and attack effectiveness. Less than 1-hour workload.
Explore ROP exploitation techniques and learn to break modern defenses with this under 1-hour material from USENIX and University of California, Berkeley.
Get personalized course recommendations, track subjects and courses with reminders, and more.