Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Marketing
Programming Languages
Discover Dentistry
Exploring Play: The Importance of Play in Everyday Life
Mathematical Economics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore authentication and authorization in microservice ecosystems with Netflix's Ian Haken. Learn about OAuth, mutual TLS, JWTs, and more in this USENIX Enigma Conference presentation.
Explore sandboxing techniques for software security with Figma's Maxime Serrano in this short USENIX Enigma Conference program. Learn to isolate workloads effectively.
Explore the complexities of web encryption with experts from the Electronic Frontier Foundation in this short USENIX Enigma Conference session.
Learn competitive hacking and team building strategies from Tyler Nighswander at the USENIX Enigma Conference. Gain insights from Carnegie Mellon's Plaid Parliament of Pwning. Less than 1-hour workload.
Explore the journey of web data beyond HTTPS encryption with Nick Sullivan, Security Engineering Lead at CloudFlare, in this short USENIX Enigma Conference session. Learn about data protection, modern web properties, and more.
Explore the intricacies of reshipping scams and credit card fraud with Giovanni Vigna, a professor at the University of California, Santa Barbara, in this less than 1-hour material from USENIX Enigma Conference.
Dive into the world of cybercrime cashouts with this short, intensive study by USENIX Enigma Conference. Learn about the tools, techniques, and defense tactics used in financially motivated cybercrimes.
Learn to defend against firmware attacks with Facebook's Teddy Reed. This USENIX Enigma Conference material covers detection, response, and system defense strategies in under an hour.
Explore the evolution of automotive security, understand software vulnerabilities in car firmware, and learn about industry responses with this less than 1-hour material from USENIX Enigma Conference.
Explore PKI deployments at scale, the use of short-lived certificates, and operational challenges with Bryan Payne from Netflix. Offered by USENIX Enigma Conference.
Explore the evolution of voting systems, their vulnerabilities, and the development of the STAR Vote system for enhanced security and accuracy in this brief, engaging study by USENIX Enigma Conference.
Explore the world of online counterfeit credit card processing with Damon McCoy from NYU in this short, insightful talk offered by USENIX Enigma Conference.
Explore the unique challenges of healthcare IT security with Avi Rubin from Johns Hopkins University in this less than 1-hour USENIX Enigma Conference material.
Explore hardware's role in system security, its vulnerabilities, and solutions with real-world examples in this short program by USENIX Enigma Conference.
Explore the vulnerabilities of machine learning models to hardware attacks with the USENIX Enigma Conference. Learn about fault-injection and side-channel attacks, and the need for robust defenses.
Get personalized course recommendations, track subjects and courses with reminders, and more.