Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive analysis of 0-day exploits from 2020, offering insights on vulnerabilities, exploitation methods, and strategies to enhance cybersecurity and protect users from unknown threats.
Explore IoT device privacy and security labeling, addressing consumer concerns and empowering informed decisions through transparent, user-friendly information at the point of purchase.
Explore global privacy attitudes through data from 90,000+ respondents across 25+ countries. Discover key findings on current and future privacy perceptions, regional variations, and actionable insights for privacy advocates.
Explore Switzerland's 15-year journey with online voting, its challenges, security issues, and the crucial role of international researchers in shaping future regulations and implementation.
Exploration of verifiable health solutions for pandemic response, addressing public safety and privacy concerns through attestation, test results, and vaccination history tracking.
Explores unique cybersecurity challenges in Brazilian internet banking, highlighting how regional factors shape threats and the need for localized threat models in global security assessments.
Explore memory unsafety in C/C++, its prevalence in major projects, and developer reactions. Learn strategies for addressing this critical issue in modern secure development.
Explore techniques for detecting fake 4G LTE base stations in real-time using open-source software and affordable hardware. Learn about IMSI catchers, their prevalence, and strategies to limit their effectiveness.
Explore how shark conservation strategies can improve security and privacy communication, avoiding fear-based tactics for more effective public discourse and problem-solving approaches.
Explore software supply chain security threats, their impact, and potential solutions through analysis of 115 attacks and vulnerabilities from the past decade.
Explore hardware's dual role in security: as a trust anchor and potential vulnerability. Learn about system-level threats, real-world examples, and promising solutions for detecting and preventing hardware vulnerabilities.
Explores hardware vulnerabilities in deep learning systems, demonstrating how fault injection and side-channel attacks can compromise model accuracy and steal proprietary information, highlighting the need for robust ML-level defenses.
Exploring sandboxing limitations in Chrome security, discussing OS constraints, and introducing memory safety as a complementary approach to enhance software resilience.
Insights on implementing client-side encryption for databases, covering challenges, solutions, and lessons learned from bringing authenticated encryption to a widely-used NoSQL database.
Explores data anonymization challenges, focusing on relationships between fields and external information that can compromise privacy. Discusses risk assessment and strategies for protecting sensitive data.
Get personalized course recommendations, track subjects and courses with reminders, and more.