Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring packing in malware and benign applications, its impact on anti-virus systems, and the challenges in distinguishing between packed malicious and legitimate software.
Explore programmatic options for protecting sensitive data against forced access, including a "nuclear" option to revoke access and wipe data when under threat.
Exploring how technologists' assumptions impact user security, challenging common beliefs in the security community, and advocating for more inclusive design practices in Internet platforms.
Exploración de vulnerabilidades en sensores de sistemas crÃticos, demostrando ataques y discutiendo defensas para dispositivos médicos, drones y wearables. Enfoque en la seguridad de sistemas de detección y actuación.
Exploring challenges and improvements in privacy notices and security warnings, discussing cognitive processes, and presenting user studies to enhance effectiveness through iterative design.
Exploring cybersecurity lessons from Secret Service strategies, focusing on interior defense and environmental control to detect and neutralize intruders effectively despite porous network boundaries.
Exploring cryptographic techniques for inherent election integrity, challenging results with objective evidence, and improving voter registration confidence.
Explore Netflix's innovative approach to securely managing secrets and identities for thousands of microservices in a cloud environment, addressing scalability and self-healing challenges.
Innovative account recovery protocol beyond traditional methods, offering user choice, privacy, and potential for end-to-end encryption key recovery. Addresses limitations of current practices in online identity management.
Exploring industry ethics as a crucial factor in balancing privacy, security, innovation, and autonomy in the face of emerging sociotechnical challenges in smart technologies and predictive services.
Insights into Gmail's defense strategies against various cyber threats, covering spam detection, phishing prevention, malware scanning, network security, and web frontend protection.
Explores global government proposals affecting encryption, their potential impacts on security and rights, and how various stakeholders are responding. Discusses ways to support strong encryption policies.
Explore web fingerprinting techniques and learn effective privacy-enhancing strategies to protect yourself from invasive trackers while browsing the internet.
Statistical framework for measuring login validity using IP and user agent, achieving high accuracy with user history and reputation systems, applicable for new and established services.
Explore CloudFlare's automated DDoS mitigation pipeline, featuring real-time threat detection, attack categorization, and centralized iptables management for efficient and rapid response to common attacks.
Get personalized course recommendations, track subjects and courses with reminders, and more.