Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Web Development
Information Technology
Digital Marketing
Functional Foods and Nutraceuticals
Modern & Contemporary American Poetry (“ModPo”)
Critical Perspectives on Management
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the debate around encryption and learn about new constructions that maximize user privacy while allowing limited access to authorities, in this less than 1-hour material from USENIX Enigma Conference.
Explore cryptographically secure data analysis with USENIX Enigma, focusing on salary disparity across gender and race. Less than 1-hour workload.
Explore malware obfuscation techniques and their impact on anti-virus systems in this short session by USENIX Enigma Conference. Learn about the challenges in malware detection and potential solutions.
Explore programmatic protections against privacy invasions with USENIX Enigma's short online material. Learn to safeguard sensitive data, implement a "nuclear" option, and initiate conversations on legal privacy investigations.
Explore the impact of technologists' assumptions on user security and privacy in this short program by USENIX Enigma Conference, featuring insights from top researchers.
Explore hacking sensors with Professor Yongdae Kim from KAIST in this less than 1-hour material from USENIX Enigma Conference. Learn about sensor security, attack vectors, and prevention methods.
Explore the importance and effectiveness of privacy notices with Carnegie Mellon Professor Lorrie Faith Cranor in this less than 1-hour USENIX Enigma Conference material.
Explore cybersecurity strategies with Illumio's Head of Cybersecurity, Nathaniel Gleicher, in this USENIX Enigma Conference. Learn from the Secret Service's approach in less than an hour.
Explore election integrity and the limitations of paper ballots with Ben Adida, VP Engineering at Clever, in this less than 1-hour USENIX Enigma Conference material. Dive into end-to-end cryptographic techniques and voter registration.
Learn how to securely manage secrets in cloud-based applications with Netflix's approach, focusing on automatic scaling and self-healing in a microservice environment. Offered by USENIX Enigma Conference.
Explore Facebook's innovative protocol for account recovery, focusing on user choice and privacy. Offered by USENIX Enigma Conference, it's a short, impactful study.
Explore the role of ethics in cybersecurity with Erin Kenneally from the U.S. Department of Homeland Security in this less than 1-hour USENIX Enigma Conference material.
Learn from Google's Anti-spam and Abuse Research Lead about defending Gmail against various threats. Understand Gmail's defense architecture, spam detection, and network security. Less than 1-hour workload.
Join the USENIX Enigma Conference for a global discussion on encryption policies, their impacts, and how to respond. Less than 1-hour commitment.
Learn to protect your online privacy with USENIX Enigma's short program. Understand browser fingerprinting metrics and effective mitigation behaviors against web trackers.
Get personalized course recommendations, track subjects and courses with reminders, and more.