Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Project Zero's mission to make zero-day vulnerabilities harder, discussing technologies and trends that have increased difficulty in vulnerability discovery and exploitation.
Exploring the intersection of simplicity, usability, and security in IT controls, sharing insights from Duo's experience protecting diverse organizations and advocating for user-friendly security solutions.
Exploring DOM-based XSS sanitation challenges and introducing DOMPurify, a novel solution for secure client-side filtering in modern web applications.
Explores end-to-end verifiability in e-voting systems, discussing its implementation in Australia's vVote project and challenges for secure internet voting in government elections.
Explores the risks of mandating exceptional access to encrypted data for law enforcement, highlighting potential security vulnerabilities and governance challenges in today's complex Internet environment.
Explore dynamic testing tools for C/C++, including Sanitizers and libFuzzer, to find and prevent various bugs. Learn about security hardening techniques like Control Flow Integrity and Safe Stack.
Exploring usable security research beyond end-users, focusing on system administrators and developers. Uses TLS to illustrate security issues across all levels and actors in information systems.
Exploring challenges in safeguarding high-risk individuals against cyber threats, focusing on targeted attacks, resource constraints, and real-world experiences in assisting vulnerable NGOs and persons.
Explore challenges in creating usable security software through Chrome's UI redesign. Learn practical insights and strategies for balancing security and user experience in large-scale applications.
NSA's Tailored Access Operations chief discusses effective security practices to thwart network exploitation attempts by sophisticated adversaries, offering insights from the perspective of elite hackers.
Explore how perverse metrics lead to poor decision-making in security and privacy, and learn techniques to avoid these pitfalls for better risk assessment and management.
Exploring technology abuse in intimate partner violence, this talk presents solutions through community-based clinics and introduces a toolkit for stakeholders to create their own support services.
Análise crÃtica das falhas na pesquisa de segurança cibernética, identificando 5 desafios principais e propondo recomendações para melhorar a eficácia e relevância dos estudos na área.
Humorous tech policy update in "SNL Weekend Update" style, covering security, privacy, and current events. Delivered by Stanford researcher at USENIX Enigma conference.
Explores security challenges in open source software, including code review, dependency management, and trust issues. Shares insights from interviews and offers practical advice for improving supply chain security.
Get personalized course recommendations, track subjects and courses with reminders, and more.