Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Business
Finance
Data Science
Working with Translation: Theory and Practice
Anatomy: Know Your Abdomen
Introduction to Graphic Illustration
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Explore how Hollywood's portrayal of passwords and hacking in movies shapes public perception of cybersecurity through analysis of 97,709 films spanning six decades.
Explore how social influences can negatively impact security and privacy decisions, revealing patterns of risky behavior transmission and proposing methods to mitigate these social effects on digital safety.
Explore fascinating parallels between aviation safety and cybersecurity principles, drawing insights from air crash investigations to enhance security control implementations and risk management.
Explore the critical aspects of privacy and security in Large Language Models through an in-depth analysis of their ability to protect sensitive information.
Dive into Continuous Access Evaluation (CAE) mechanisms to enhance token security, understand critical events, and implement strict enforcement for better access control in modern authentication systems.
Delve into BGP prefix hijacking's role in spam warfare, exploring how spammers exploit network routing to defeat blacklists and the concerning implications for IPv4 address manipulation.
Discover key principles for transforming security research into real-world impact, bridging academic innovation with practical implementation through hard-won lessons and case studies in software safety.
Explore the critical intersection of computer security and electronic voting systems through expert insights on vulnerabilities, verification technologies, and essential safeguards for trustworthy elections.
Delve into online gaming security vulnerabilities, cheating mechanisms, and protective measures with insights from gaming security expert Gary McGraw, exploring privacy concerns and bot creation in MMORPGs.
Discover how automated detection frameworks identify security flaws in web browser mechanisms, exploring practical approaches to validate web invariants and detect vulnerabilities across major browsers.
Explore critical security vulnerabilities in VoWiFi deployments, focusing on IPsec tunnel key exchanges and their implications for mobile network operators and user equipment worldwide.
Explore the security challenges and protective strategies of Pakistani content creators, focusing on online threats, sociocultural contexts, and the lack of support systems for vulnerable creators.
Uncover critical security vulnerabilities in digital wallet payment systems, exploring authentication bypasses, authorization flaws, and access control weaknesses affecting major banks and payment apps.
Discover how reinforcement learning can generate adversarial examples to challenge GNN-based hardware security systems, demonstrating vulnerabilities in IP piracy detection and Trojan identification methods.
Explore groundbreaking advances in privacy-preserving machine learning with MD-ML framework, offering enhanced security and efficiency for multi-party computation in neural network inference and training.
Get personalized course recommendations, track subjects and courses with reminders, and more.