Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Panel discussion exploring browser privacy approaches, engineering challenges, and tradeoffs from experts at Brave, Edge, Firefox, and Chrome. Insights on enhancing user privacy while balancing functionality.
Comparative analysis of major browsers' privacy initiatives, exploring technical details and effectiveness in protecting user privacy on desktop and mobile platforms.
Explore cultural dimensions of privacy and security in global tech, unlocking innovation through understanding diverse perspectives on trust, timing, and data management.
Explores vulnerabilities in smart toys, demonstrating potential security risks and privacy breaches. Offers mitigation strategies for parents and manufacturers to protect children's data and ensure safer IoT devices.
Explores biases in machine learning for malware classification, proposing constraints and metrics for realistic evaluation. Introduces TESSERACT framework to improve classifier performance and ensure fair comparisons.
Explore frictionless authentication using behavioral biometrics to combat sophisticated bot attacks and account takeovers, with insights on implementation, machine learning, and creating a zero-trust environment.
Explore abusability testing to anticipate potential misuse of technology, enhancing product safety and ethical design considerations.
Predicting vulnerability exploitation using data from 10 million hosts. Explores factors influencing hacker decisions and presents models to assess exploitation risk, aiding in cybersecurity and risk management.
Exploring Hardware Security Modules: their unique role, limitations, and evolving needs in modern cryptography. Discusses premises and cloud-based HSMs, workarounds, and future directions for enhanced security solutions.
Explores the rise of digital authoritarianism, its global impact, and strategies for democracies to counter it through a reimagined approach to information security and data protection.
Exploring privacy risks in mobile apps: automated analysis of 80,000+ Android apps reveals widespread tracking, data sharing, and potential regulatory violations. Discusses implications for developers, platforms, and regulators.
Exploring insider attack threats in mobile ecosystems and Android's multi-level defense strategies, including hardware-level protections and system software transparency to enhance user security.
Explore how physical operational security practices can enhance information security mindset, risk assessment skills, and decision-making in both professional and personal contexts.
Exploring AWS's provable security: Using automated reasoning to detect misconfigurations and provide absolute assurance in cloud security, protecting customers in an evolving threat landscape.
Insights on applying enterprise security practices to political organizations, addressing phishing, best practices implementation, and disinformation campaigns. Valuable for SMBs and tech product developers.
Get personalized course recommendations, track subjects and courses with reminders, and more.