Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cultural dimensions of privacy and security in global tech, unlocking innovation through understanding diverse perspectives on trust, timing, and data management.
Explores vulnerabilities in smart toys, demonstrating potential security risks and privacy breaches. Offers mitigation strategies for parents and manufacturers to protect children's data and ensure safer IoT devices.
Explores biases in machine learning for malware classification, proposing constraints and metrics for realistic evaluation. Introduces TESSERACT framework to improve classifier performance and ensure fair comparisons.
Explore frictionless authentication using behavioral biometrics to combat sophisticated bot attacks and account takeovers, with insights on implementation, machine learning, and creating a zero-trust environment.
Explore abusability testing to anticipate potential misuse of technology, enhancing product safety and ethical design considerations.
Predicting vulnerability exploitation using data from 10 million hosts. Explores factors influencing hacker decisions and presents models to assess exploitation risk, aiding in cybersecurity and risk management.
Exploring Hardware Security Modules: their unique role, limitations, and evolving needs in modern cryptography. Discusses premises and cloud-based HSMs, workarounds, and future directions for enhanced security solutions.
Explores the rise of digital authoritarianism, its global impact, and strategies for democracies to counter it through a reimagined approach to information security and data protection.
Exploring privacy risks in mobile apps: automated analysis of 80,000+ Android apps reveals widespread tracking, data sharing, and potential regulatory violations. Discusses implications for developers, platforms, and regulators.
Exploring insider attack threats in mobile ecosystems and Android's multi-level defense strategies, including hardware-level protections and system software transparency to enhance user security.
Explore how physical operational security practices can enhance information security mindset, risk assessment skills, and decision-making in both professional and personal contexts.
Exploring AWS's provable security: Using automated reasoning to detect misconfigurations and provide absolute assurance in cloud security, protecting customers in an evolving threat landscape.
Insights on applying enterprise security practices to political organizations, addressing phishing, best practices implementation, and disinformation campaigns. Valuable for SMBs and tech product developers.
Exploring technical solutions for balancing encryption and government access, proposing "crypto crumple zones" to maximize privacy while allowing limited exceptional access in politically uncertain times.
Secure multi-party computation enables analysis of sensitive salary data to calculate pay disparities while maintaining confidentiality, demonstrating potential for social impact in privacy-constrained contexts.
Get personalized course recommendations, track subjects and courses with reminders, and more.