Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore economic aspects of security adoption failures, incentive-aligned design, and the balance between information sharing and privacy, with real-world examples and research insights.
Eva Galperin discusses recent efforts to combat stalkerware, a covert surveillance tool often used in domestic abuse. She highlights initiatives by security companies, tech giants, and support organizations to protect victims.
Explore cell network vulnerabilities, focusing on pre-authentication message exploitation. Learn about IMSI catchers, spoofing attacks, and ongoing efforts to address these security challenges.
Exploring Google's BeyondProd: A cloud-native security model emphasizing service trust, workload isolation, and automated vulnerability management for microservices-based architectures.
Explore strategies for measuring and prioritizing online abuse, including user reports, human labeling, and automated systems. Learn about the "Abuse Uncertainty Principle" and its implications for detection and metrics.
Exploring challenges in US election systems and innovative solutions for trustworthy voting technology, including ElectionGuard and SSITH projects.
Explore modern voting system security, from settled practices to ongoing debates. Learn about audits, online voting, accessibility, and the mission of democracy in this informative talk.
Explore data practices, localization, and ethical challenges in the digital age. Learn about Lean Data Principles and ecosystem challenges for a more responsible data-driven world.
Explore blockchain-based secure data markets for privacy-preserving analytics and machine learning, addressing challenges and showcasing real-world applications in healthcare and beyond.
Explores browser evolution as a user agent, advocating for smarter security mechanisms and informed decision-making to enhance user privacy and content monetization on the web.
Exploring TLS security layer architecture, POSIX socket API abstraction, and simplified certificate validation for easier secure application development and improved system-wide best practices.
Explore data-driven methods for predicting vulnerability exploitation, combining technical features and social media insights to assess real-world security risks and guide defensive strategies.
Exploring the challenges of URLs as security indicators, discussing user behavior, phishing attacks, and potential solutions for improving web security and user trust.
Exposé critique des cryptomonnaies et blockchains, soulignant leurs failles fondamentales, leur incompatibilité avec la finance moderne et leurs vulnérabilités exploitables, tout en proposant des pistes pour les contrer.
Explore critical healthcare cybersecurity issues, including connected medicine risks, recent attacks, and innovative clinical hacking simulations to improve patient safety and national security.
Get personalized course recommendations, track subjects and courses with reminders, and more.