Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Programming Languages
Data Analysis
Paleontology: Theropod Dinosaurs and the Origin of Birds
Preparing to Manage Human Resources
Transforming Digital Learning: Learning Design Meets Service Design
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to create dynamic video prototypes with ACM's Montage system, enhancing design process by combining video with digital sketches. Less than 1-hour workload.
Explore Federated Learning and data privacy with ACM's short program. Learn about local gradients, differential privacy, and new techniques in under an hour.
Learn to predict debug information in stripped binaries using machine learning with ACM's concise material, including variable recovery and malware inspection.
Explore privacy implications of browser extensions with ACM's study, delving into taint tracking, data flow, and control-flow dependencies in under an hour.
Explore the world of drive-by cryptocurrency mining and its defense with this ACM offering. In less than an hour, learn about cryptomining services, cyber threats, and evasion techniques.
Explore the concept of Memory Hard Functions (MHFs) and their applications in password hashing, key stretching, and proofs of work with this ACM offering. Less than 1 hour.
Explore the secure computation of ECDSA in a distributed manner with this ACM offering. In under an hour, learn about its implementation, operation, and challenges.
Explore deep learning techniques to undermine website fingerprinting defenses in this ACM offering. Less than 1-hour workload, includes experiments and Q&A.
Explore flow correlation attacks on Tor using deep learning with ACM's material. Learn about data collection, countermeasures, and the impact of time in under an hour.
Explore Tor's information leakage, website fingerprinting attacks, and defenses with ACM's concise material. Learn about Adaptive Kernel Density Estimation, Kononex Algorithm, and more.
Learn to mitigate risk and comply with data retention laws in under an hour with ACM's online material, focusing on encryption, compliance proofs, and performance comparison.
Explore password-based threshold authentication with ACM's under 1-hour material. Learn about PASTA framework, token generation, and offline dictionary attacks.
Explore speculative execution and its security implications in this ACM study, with topics ranging from caches and return stack buffers to countermeasures. Less than 1 hour workload.
Explore the Secure Multipath Key Exchange protocol with ACM's material, offering benefits of opportunistic encryption and protection against active attackers in under an hour.
Explore fuzz testing techniques and strategies with ACM's short program. Learn to evaluate fuzzer effectiveness, perform trials, and use history to find root causes.
Get personalized course recommendations, track subjects and courses with reminders, and more.