Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Statistical framework for measuring login validity using IP and user agent, achieving high accuracy with user history and reputation systems, applicable for new and established services.
Explore CloudFlare's automated DDoS mitigation pipeline, featuring real-time threat detection, attack categorization, and centralized iptables management for efficient and rapid response to common attacks.
Explore Project Zero's mission to make zero-day vulnerabilities harder, discussing technologies and trends that have increased difficulty in vulnerability discovery and exploitation.
Exploring the intersection of simplicity, usability, and security in IT controls, sharing insights from Duo's experience protecting diverse organizations and advocating for user-friendly security solutions.
Exploring DOM-based XSS sanitation challenges and introducing DOMPurify, a novel solution for secure client-side filtering in modern web applications.
Explores end-to-end verifiability in e-voting systems, discussing its implementation in Australia's vVote project and challenges for secure internet voting in government elections.
Explores the risks of mandating exceptional access to encrypted data for law enforcement, highlighting potential security vulnerabilities and governance challenges in today's complex Internet environment.
Explore dynamic testing tools for C/C++, including Sanitizers and libFuzzer, to find and prevent various bugs. Learn about security hardening techniques like Control Flow Integrity and Safe Stack.
Exploring usable security research beyond end-users, focusing on system administrators and developers. Uses TLS to illustrate security issues across all levels and actors in information systems.
Exploring challenges in safeguarding high-risk individuals against cyber threats, focusing on targeted attacks, resource constraints, and real-world experiences in assisting vulnerable NGOs and persons.
Explore challenges in creating usable security software through Chrome's UI redesign. Learn practical insights and strategies for balancing security and user experience in large-scale applications.
NSA's Tailored Access Operations chief discusses effective security practices to thwart network exploitation attempts by sophisticated adversaries, offering insights from the perspective of elite hackers.
Explore how perverse metrics lead to poor decision-making in security and privacy, and learn techniques to avoid these pitfalls for better risk assessment and management.
Exploring technology abuse in intimate partner violence, this talk presents solutions through community-based clinics and introduces a toolkit for stakeholders to create their own support services.
Análise crÃtica das falhas na pesquisa de segurança cibernética, identificando 5 desafios principais e propondo recomendações para melhorar a eficácia e relevância dos estudos na área.
Get personalized course recommendations, track subjects and courses with reminders, and more.