Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Business
Finance
Data Science
Working with Translation: Theory and Practice
Anatomy: Know Your Abdomen
Introduction to Graphic Illustration
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Discover comprehensive Apple device security solutions with Jamf Protect and Safe Internet, exploring deployment strategies and configuration options to enhance your organization's defense capabilities.
Discover how to streamline macOS security compliance with Jamf's new tool for implementing security baselines, generating documentation, and seamlessly integrating with Jamf Pro through automated configurations.
Découvrez comment sécuriser efficacement votre écosystème Apple en entreprise en combinant BeyondCorp de Google et Jamf Pro pour une gestion optimale des appareils et un accès Zero-Trust aux données.
Discover how to implement security frameworks for Apple devices, manage compliance, and protect endpoints while maintaining optimal user experience in modern workplaces.
Master security compliance strategies for Apple devices in workplace environments, covering device management, encryption, endpoint protection and regulatory requirements for both corporate and BYOD scenarios.
Discover how to secure educational devices using Jamf's integration with Apple OS and MDM, while implementing comprehensive protection features for teachers and students.
Discover how AI revolutionizes cybersecurity practices, enhances threat detection, and transforms defensive strategies through advanced cognitive computing and machine learning applications.
Explore the privacy implications and security vulnerabilities of voice assistant technologies, examining potential risks and essential safeguards for protecting personal data.
Dive into essential app security principles and best practices for iOS development, exploring threat modeling, encryption implementation, and secure coding techniques.
Discover essential strategies for Mac endpoint security and resilience, exploring immune system-like defenses to protect against modern threats and vulnerabilities.
Explore Apple's Launch and Environment Constraints security features in macOS, understanding their implementation, impact on system protection, and practical application for third-party developers.
Dive into Safari browser exploitation through JavaScriptCore vulnerabilities, exploring fuzzing techniques, type confusion bugs, and modern Apple exploit mitigations for enhanced browser security understanding.
Delve into the security mechanisms and potential privacy concerns of Apple AirTags, exploring encryption protocols, FindMy framework vulnerabilities, and future protocol standards for tracking devices.
Delve into macOS Gatekeeper bypass vulnerabilities and quarantine attribute failures, exploring CVE-2021-1810 and CVE-2023-27943 through detailed analysis and discovery processes.
Dive into macOS's Background Task Management system, exploring its internal workings, security implications, and potential vulnerabilities in managing launch items and persistence mechanisms on Apple devices.
Get personalized course recommendations, track subjects and courses with reminders, and more.