Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Business
Finance
Data Science
Working with Translation: Theory and Practice
Anatomy: Know Your Abdomen
Introduction to Graphic Illustration
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Aprenda conceitos fundamentais de segurança na nuvem AWS, incluindo controle de acesso, criptografia de dados e proteção de infraestrutura. Explore serviços e práticas para atender às necessidades de segurança da sua organização.
Aprende conceptos básicos de seguridad en AWS: control de acceso, cifrado, protección de red y servicios de seguridad. Explora responsabilidades, gestión de identidades y respuesta a incidentes.
Learn essential Android security updates, user safeguards against scams and theft, and how to protect your app using the latest Play Integrity API features for enhanced mobile security.
Explore KubeArmor: a runtime security system for cloud-native environments. Learn how it restricts pod, container, and node behavior using Linux security modules and generates rich alerts with eBPF.
Aprenda práticas recomendadas de segurança na AWS, incluindo proteção de rede, segurança computacional e monitoramento, para proteger sua infraestrutura e detectar ameaças rapidamente.
Explores youth and parent perspectives on online privacy and security, revealing insights into children's knowledge and parental influence methods for safer internet practices.
Evaluates three e-mail security tools to improve phishing detection, finding "suspicion score" nudge and "check" button most effective for professional users without hindering productivity.
Investigación sobre preocupaciones de usabilidad, seguridad y privacidad de cerraduras inteligentes mediante entrevistas a usuarios, revelando estrategias de mitigación e indiferencia ante ciertos riesgos.
Explore GPTHound, an AI-powered tool enhancing Active Directory security assessments. Learn how it simplifies query generation, asset classification, sensitive information detection, and attack path analysis across multiple languages.
Explore lessons learned in security incident and vulnerability management, examining current practices and potential improvements in cybersecurity strategies.
Explore magnetic tape storage as a defense against ransomware, its unique properties, and potential vulnerabilities. Learn about data center usage and security considerations from an operator's perspective.
Explore Amazon Cognito security misconfigurations, learn testing techniques for audits and bug bounty hunting, and discover mitigation strategies through a real-world account takeover case study.
Exploring critical vulnerabilities in residential and commercial power control systems, highlighting potential catastrophic risks and novel attack scenarios in the energy sector.
Explore the latest advancements in Spring Security 6, including OAuth 2 and OpenID Connect. Learn hands-on techniques for upgrading Spring applications and implementing robust security measures in Java development.
Explore mobile app security vulnerabilities, focusing on leaked credentials in source code and compiled apps. Learn about common secret types, leak sources, and prevention strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.