Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Additive Manufacturing
Caregiving
How to Succeed at: Interviews
Sheep in the Land of Fire and Ice
Advanced Precalculus: Geometry, Trigonometry and Exponentials
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Medical devices online courses. Find the best Medical devices training programs and enhance your skills today!
Explore security vulnerabilities in IoT devices through live demonstrations, uncovering root access on routers, toys, and cameras. Learn about the importance of penetration testing and responsible disclosure.
Explore physical-layer BLE location tracking attacks on mobile devices, examining privacy risks, hardware imperfections, and real-world tracking experiments.
Explore electromagnetic interference attacks on touchscreens, including precise touch events, phone locators, and various attack scenarios for enhanced device security awareness.
Explores context-aware, automatic runtime permissions for mobile devices, using machine learning to predict user decisions and offering data obfuscation options to balance privacy and utility.
Analyze emission defeat devices in modern automobiles, exploring detection methods, impact on engine behavior, and challenges for regulators in ensuring compliance with environmental standards.
Explore how privacy and security factors influence consumer perceptions and purchasing decisions for IoT devices, with insights on risk assessment and labeling effectiveness.
Explore innovative techniques for identifying fuzzing triggers in IoT companion apps, enabling more effective generation of under-constrained inputs for device testing and security analysis.
Innovative framework for attesting operation integrity of embedded devices, addressing control-flow hijacks and data-only attacks in IoT systems through lightweight measurement and verification techniques.
Explores voter detection of ballot marking device manipulation, examining review rates and effectiveness of interventions to improve verification in electronic voting systems.
Unveils a robust de-anonymization technique for Bluetooth Classic devices, demonstrating vulnerabilities in privacy guarantees and enabling tracking of piconet masters through SDR-based sniffing.
Watch UI/UX designer Howard Pinsky create a mobile app and website for the medical industry using Adobe XD, showcasing new sharing and prototype features while providing practical design tips and techniques.
Learn UI/UX design with Howard Pinsky as he creates a medical app and website using Adobe XD, demonstrating new features and practical techniques for effective mobile and web experiences.
Discover mobile photo editing techniques using Lightroom and Photoshop on iPad. Learn to enhance composition, color, and exposure, make selective edits, and master retouching and compositing on-the-go.
Explore vulnerabilities in Ruckus AP devices, including pre-authentication remote code execution exploits. Learn about research methods, discovered CVEs, and a framework for cross-architecture analysis.
Explore IPv6 stack optimization for low-power devices, covering cross-layer design, hardware acceleration, header compression, and implementation examples with performance analysis.
Get personalized course recommendations, track subjects and courses with reminders, and more.