Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore automotive cybersecurity evolution, vulnerabilities in modern vehicles, and the impact of research disclosure on industry and government responses to these critical issues.
Explore PKI deployment challenges at scale, focusing on short-lived certificates for cloud microservices. Learn about operational hurdles, scaling certificate authorities, and maintaining instance trustworthiness.
Exploring the evolution of voting systems, challenges with electronic voting, and the development of STAR Vote for secure, transparent, and auditable elections in Travis County, Texas.
Explore the world of bullet-proof credit card processing for counterfeit goods, its ecosystem, and the challenges in disrupting these operations. Learn about rogue payment facilitators and their sophisticated filtering systems.
Explore healthcare IT security challenges, from doctor complexes to patient data access, and learn about vulnerabilities in medical devices, cloud systems, and wearable technology.
Explore Switzerland's 15-year journey with online voting, its challenges, security issues, and the crucial role of international researchers in shaping future regulations and implementation.
Exploration of verifiable health solutions for pandemic response, addressing public safety and privacy concerns through attestation, test results, and vaccination history tracking.
Explores unique cybersecurity challenges in Brazilian internet banking, highlighting how regional factors shape threats and the need for localized threat models in global security assessments.
Explore memory unsafety in C/C++, its prevalence in major projects, and developer reactions. Learn strategies for addressing this critical issue in modern secure development.
Explore techniques for detecting fake 4G LTE base stations in real-time using open-source software and affordable hardware. Learn about IMSI catchers, their prevalence, and strategies to limit their effectiveness.
Explore how shark conservation strategies can improve security and privacy communication, avoiding fear-based tactics for more effective public discourse and problem-solving approaches.
Explore software supply chain security threats, their impact, and potential solutions through analysis of 115 attacks and vulnerabilities from the past decade.
Explore hardware's dual role in security: as a trust anchor and potential vulnerability. Learn about system-level threats, real-world examples, and promising solutions for detecting and preventing hardware vulnerabilities.
Explores hardware vulnerabilities in deep learning systems, demonstrating how fault injection and side-channel attacks can compromise model accuracy and steal proprietary information, highlighting the need for robust ML-level defenses.
Exploring sandboxing limitations in Chrome security, discussing OS constraints, and introducing memory safety as a complementary approach to enhance software resilience.
Get personalized course recommendations, track subjects and courses with reminders, and more.