Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring technical solutions for balancing encryption and government access, proposing "crypto crumple zones" to maximize privacy while allowing limited exceptional access in politically uncertain times.
Secure multi-party computation enables analysis of sensitive salary data to calculate pay disparities while maintaining confidentiality, demonstrating potential for social impact in privacy-constrained contexts.
Exploring packing in malware and benign applications, its impact on anti-virus systems, and the challenges in distinguishing between packed malicious and legitimate software.
Explore programmatic options for protecting sensitive data against forced access, including a "nuclear" option to revoke access and wipe data when under threat.
Exploring how technologists' assumptions impact user security, challenging common beliefs in the security community, and advocating for more inclusive design practices in Internet platforms.
Exploración de vulnerabilidades en sensores de sistemas crÃticos, demostrando ataques y discutiendo defensas para dispositivos médicos, drones y wearables. Enfoque en la seguridad de sistemas de detección y actuación.
Exploring challenges and improvements in privacy notices and security warnings, discussing cognitive processes, and presenting user studies to enhance effectiveness through iterative design.
Exploring cybersecurity lessons from Secret Service strategies, focusing on interior defense and environmental control to detect and neutralize intruders effectively despite porous network boundaries.
Exploring cryptographic techniques for inherent election integrity, challenging results with objective evidence, and improving voter registration confidence.
Explore Netflix's innovative approach to securely managing secrets and identities for thousands of microservices in a cloud environment, addressing scalability and self-healing challenges.
Innovative account recovery protocol beyond traditional methods, offering user choice, privacy, and potential for end-to-end encryption key recovery. Addresses limitations of current practices in online identity management.
Exploring industry ethics as a crucial factor in balancing privacy, security, innovation, and autonomy in the face of emerging sociotechnical challenges in smart technologies and predictive services.
Insights into Gmail's defense strategies against various cyber threats, covering spam detection, phishing prevention, malware scanning, network security, and web frontend protection.
Explores global government proposals affecting encryption, their potential impacts on security and rights, and how various stakeholders are responding. Discusses ways to support strong encryption policies.
Explore web fingerprinting techniques and learn effective privacy-enhancing strategies to protect yourself from invasive trackers while browsing the internet.
Get personalized course recommendations, track subjects and courses with reminders, and more.