Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Marketing
Web Development
Digital Skills
Applied Scrum for Agile Project Management
Cyber Security
Improving Healthcare Through Clinical Research
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to create dynamic video prototypes with ACM's Montage system, enhancing design process by combining video with digital sketches. Less than 1-hour workload.
Explore Federated Learning and data privacy with ACM's short program. Learn about local gradients, differential privacy, and new techniques in under an hour.
Explore multi-user security of GCM with ACM's material, offering new concrete security bounds and highlighting nonce re-use and re-keying impacts. Less than 1-hour workload.
Explore control-flow integrity and learn to prevent control-hijacking attacks with this ACM offering. In under an hour, understand unique code target property and efficient analysis path reconstruction.
Explore hardware fingerprinting through timing execution of API functions with ACM's material. Learn remotely with simple JavaScript code in under an hour.
Learn to predict security incidents before they occur with ACM's short program. Understand proactive defenses, exposure prediction methods, and user behavior analysis.
Dive into real-time system intrusion analysis with ACM's short program. Learn about provenance-based security, forensic objectives, and changes to provenance architecture.
Learn to predict debug information in stripped binaries using machine learning with ACM's concise material, including variable recovery and malware inspection.
Explore privacy implications of browser extensions with ACM's study, delving into taint tracking, data flow, and control-flow dependencies in under an hour.
Explore the world of drive-by cryptocurrency mining and its defense with this ACM offering. In less than an hour, learn about cryptomining services, cyber threats, and evasion techniques.
Explore the concept of Memory Hard Functions (MHFs) and their applications in password hashing, key stretching, and proofs of work with this ACM offering. Less than 1 hour.
Explore the secure computation of ECDSA in a distributed manner with this ACM offering. In under an hour, learn about its implementation, operation, and challenges.
Explore deep learning techniques to undermine website fingerprinting defenses in this ACM offering. Less than 1-hour workload, includes experiments and Q&A.
Explore flow correlation attacks on Tor using deep learning with ACM's material. Learn about data collection, countermeasures, and the impact of time in under an hour.
Explore Tor's information leakage, website fingerprinting attacks, and defenses with ACM's concise material. Learn about Adaptive Kernel Density Estimation, Kononex Algorithm, and more.
Get personalized course recommendations, track subjects and courses with reminders, and more.