Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Psychology
Marketing
Python
The Emergence of the Modern Middle East - Part I
Moralities of Everyday Life
Technical Report Writing for Engineers
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to create dynamic video prototypes with ACM's Montage system, enhancing design process by combining video with digital sketches. Less than 1-hour workload.
Explore Federated Learning and data privacy with ACM's short program. Learn about local gradients, differential privacy, and new techniques in under an hour.
Explore the balance between user growth and research in industrial settings, using Microsoft's Ruuh as a case study. Offered by ACM, this less than 1-hour material discusses challenges, opportunities, and trade-offs.
Explore Industry 4.0 opportunities in the meat processing sector with ACM's talk on an IIoT solution for real-time computation and delivery of plant KPIs. Less than 1-hour workload.
Learn to design and maintain ML products with Grace Huang, Data Science Manager at Pinterest, in this 1-2 hour webinar by ACM. Topics include data considerations, bias, testing, and automation.
Learn to use ALCHEMY for Fully Homomorphic Encryption with ACM's concise guide. No special knowledge required, ideal for programmers. Less than 1-hour workload.
Learn to recover C++ abstractions from executables using OOAnalyzer with ACM's material, covering design, reasoning types, and evaluation. Less than 1hr workload.
Explore deep learning applications in security with ACM's material, focusing on explanation techniques, limitations, and the LEMNA method. Less than 1-hour workload.
Explore the security threats to ML systems through ACM's study on model-reuse attacks, focusing on how malicious models can manipulate host systems. Less than 1hr read.
Explore vulnerabilities in ANSI X9.31 RNG implementations with ACM's study, focusing on static, hard-coded keys. Less than 1-hour workload.
Explore primality testing under adversarial conditions with ACM's analysis, focusing on non-random, potentially malicious number generation. Less than 1-hour workload.
Explore the Matrix-Variate Gaussian mechanism for differential privacy with ACM's material, covering key concepts, methods, and experimental results in under an hour.
Explore Local Differential Privacy and marginal table construction with ACM's concise guide. Learn about data collection, deployment, and application of LDP in under an hour.
Explore the threat of power attacks in multi-tenant data centers with ACM's paper. Learn about data center security, power attack cost analysis, and voltage side channels in under an hour.
Explore large-scale, language-oblivious code authorship identification with ACM's deep learning-based system. Less than 1-hour workload.
Get personalized course recommendations, track subjects and courses with reminders, and more.