Courses from 1000+ universities
A human analysis of financial documents reveals what AI content farms missed: Duolingo’s GenAI features are undermining its own profit margins.
600 Free Google Certifications
Artificial Intelligence
Information Technology
Computer Networking
Introduction to Cyber Security
Competencias para buscar, mantener y promocionar en un empleo
Mining Massive Datasets
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the impact of malware behavior variability on analysis and detection techniques, based on a large-scale study of 5.6 million hosts worldwide.
Explore how the Internet enhances humanity by fostering pro-social interactions and reducing anti-social behaviors, while examining regulatory challenges that may hinder this potential.
Exploring opportunity cost in security decision-making to transform programs from organizational drags to uplifting forces, considering tangible and intangible costs beyond monetary aspects.
Seasoned journalists discuss ethical dilemmas and responsibilities in cybercrime reporting, exploring source relationships, obligations to stakeholders, and real-world investigative experiences.
Exploring legal and practical strategies for AI auditors to overcome barriers in testing algorithmic bias, drawing lessons from security testing practices and advocating for policy changes.
Explore challenges journalists face using open source technologies globally, including pre- and post-COVID impacts, based on five years of field research with investigative reporters.
Experts discuss memory safety vulnerabilities, their impact on modern computing, and strategies for protection. Explores current landscape, challenges, and progress in addressing this critical security issue.
Explore best practices for protecting whistleblower communications and Congress's role in safeguarding those who expose abuses of power, as discussed by the Office of Whistleblower Ombuds.
Explores how geopolitical changes impact computer security and privacy for vulnerable populations, examining case studies and recommending design strategies to reduce vulnerability during times of crisis and change.
Explores web PKI's flaws, revealing the fragile security infrastructure behind HTTPS connections. Discusses issues with certificate authorities and proposes improvements for future server authentication models.
Experts discuss the challenges and limitations of anonymizing geolocation data, exploring regulatory and technical advancements in privacy protection for location information.
Essential communication strategies for whistleblowers: considerations, must-haves, pitfalls to avoid, and effective storytelling techniques to navigate this life-changing decision.
Exploring practical applications of searching encrypted data, focusing on structured encryption for efficient querying in high-performance distributed systems and its integration into modern databases.
Panel discussion exploring creative approaches to inform users about data rights beyond traditional privacy policies, featuring experts from tech, law, and privacy advocacy.
Explore the prevalence of misleading online ads, their impact on users, and the need for increased research and transparency in ad content to combat scams and malicious practices.
Get personalized course recommendations, track subjects and courses with reminders, and more.