Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Language Learning
Software Development
Graphic Design
Greek and Roman Mythology
Computational Social Science Methods
Bioseguridad y equipo de protección para la prevención de COVID-19
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to create dynamic video prototypes with ACM's Montage system, enhancing design process by combining video with digital sketches. Less than 1-hour workload.
Explore Federated Learning and data privacy with ACM's short program. Learn about local gradients, differential privacy, and new techniques in under an hour.
Explore the Honey Badger of BFT Protocols with ACM's concise material, covering asynchronous protocols, optimal resilience, and deployment scenarios.
Explore block-level provenance-based data protection for USB devices with this ACM material, covering USB security history, integrity models, and audit log scenarios.
Explore security and consistency in computing with this ACM offering. Learn about transaction stages, system state, and information flow control in under an hour.
Explore least privilege memory views for multithreaded applications with ACM's concise material, featuring expert insights and practical examples.
Explore the concepts of Non-Interference and Higher-Order Masking in this ACM presentation, with topics like Differential Power Analysis and Probing Security. Less than 1-hour workload.
Learn high fidelity data reduction for big data security dependency analyses from ACM, with less than 1 hour of material. Gain real-world experiences and future insights.
Explore scalable graph-based bug search for firmware images with this ACM presentation. Learn about IoT vulnerabilities, feature extraction, and evaluation methods in under an hour.
Explore reliable third-party library detection in Android and its security applications with this ACM offering. Learn about app security, library fragmentation, and crypto API in under an hour.
Learn to deobfuscate Android applications using statistical methods with ACM's concise material, including probabilistic graphical models and implementation experiments.
Explore Android system server attacks and defense approaches with this ACM offering. Learn about malicious callbacks, system apps vulnerabilities, and detection methods in under an hour.
Explore the misuse of Android Unix domain sockets and their security implications in this ACM-presented study. Learn about threat models, authentication, and real-world usage in under an hour.
Learn to identify the infrastructure behind Amplification DDoS attacks in less than an hour with this ACM offering. The material covers scanning, honeypot, and trilateration.
Explore safe Tor measurement techniques with ACM's concise material, presented by U.S. Naval Research Laboratory experts. Learn about PrivCount, exit policies, and user uniqueness.
Get personalized course recommendations, track subjects and courses with reminders, and more.