Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Ethical Hacking
Lean Production
Introduction to Cyber Security
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Medical devices online courses. Find the best Medical devices training programs and enhance your skills today!
Explores voter detection of ballot marking device manipulation, examining review rates and effectiveness of interventions to improve verification in electronic voting systems.
Analyze emission defeat devices in modern automobiles, exploring detection methods, impact on engine behavior, and challenges for regulators in ensuring compliance with environmental standards.
Explore vulnerabilities in ICS remote management devices, including discovery methods, attack patterns, and effective remediation strategies for enhancing industrial control system security.
Explore how privacy and security factors influence consumer perceptions and purchasing decisions for IoT devices, with insights on risk assessment and labeling effectiveness.
Explore innovative techniques for identifying fuzzing triggers in IoT companion apps, enabling more effective generation of under-constrained inputs for device testing and security analysis.
Discover the Vertical Farm Project with medical ecologist Dickson Despommier, exploring urban renewal and sustainable food production through innovative skyscraper farming techniques.
Nobel laureate Harold Varmus and Brian Greene discuss the COVID-19 pandemic, scientific literacy, cancer research advancements, and the role of scientists in today's political climate.
Explores efficient graph processing on emerging storage devices, proposing a new partitioning framework that leverages improved random access capabilities for 2X better performance than state-of-the-art solutions.
Exploring security vulnerabilities in smart home platforms through reverse engineering and phantom device testing, revealing unexpected state transitions and potential attacks.
Innovative gesture recognition system for low-power devices, utilizing existing wireless signals to enable always-on functionality across various platforms, including battery-free devices.
Explore how medical field strategies can enhance incident response in tech systems, from algorithm-guided decisions to standardized protocols for effective management and resolution.
Explore KPIO, a new security standard for NVMe storage devices offering granular encryption, enhanced data protection, and improved compliance with data privacy regulations.
Explore critical security vulnerabilities in DICOM servers, protocols, and libraries used in medical imaging systems. Learn to identify and fix bugs in the DICOM ecosystem.
Explores context-aware, automatic runtime permissions for mobile devices, using machine learning to predict user decisions and offering data obfuscation options to balance privacy and utility.
Optimizing IoT device protection through innovative blacklist creation and evaluation. Proposes the Attacker IP Prioritizer algorithm and a standardized methodology for assessing blacklist effectiveness in resource-constrained environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.