Courses from 1000+ universities
Online learning can be more than content delivery. It can be where community happens.
600 Free Google Certifications
Web Development
Data Analysis
Digital Marketing
CS50's AP® Computer Science Principles
Product Management Essentials
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Explore cutting-edge strategies for securing smart homes in this DefCamp 2023 presentation. Learn about emerging threats and innovative solutions to protect IoT devices and networks at the edge.
Explore privacy and security insights from DefCamp 2023, featuring expert analysis on balancing data protection with robust cybersecurity measures in today's digital landscape.
Explore DNS DR's role in shifting cybersecurity from reactive to proactive approaches, enhancing threat detection and response capabilities for modern network defense strategies.
Explore common AppSec contractual pitfalls and best practices for securing software development agreements in this DefCamp 2023 presentation by Canon's EMEA Information Security Manager.
Explore data security strategies at Booking.com, focusing on concealment techniques and protective measures in cybersecurity. Learn from a senior manager's insights on safeguarding sensitive information.
Explore how GPT models can enhance security research through few-shot learning, code generation, and retrieval augmentation. Gain insights and practical examples to leverage AI in empowering security teams.
Explore Microsoft Security Copilot's AI-powered capabilities for enhancing security operations, incident response, and best practices implementation in Microsoft environments.
Insights on cloud native supply chain security beyond SBOMs. Experts discuss straightforward approaches, simple security practices, and future perspectives using open-source tools and frameworks.
Explore software supply chain security using GUAC and Trustification projects, and learn to create policies with OPA for validating artifacts in cluster environments.
Explore Kubernetes security vulnerabilities in system pods, focusing on misconfigurations that can lead to unauthorized access and data breaches. Learn about real-world exploit chains and mitigation strategies.
Explore implementing mutual TLS in Istio multi-cluster environments using SPIRE. Learn about security challenges, mTLS, Istio's features, and SPIRE integration for enhanced microservices security.
Explore Cilium ClusterMesh implementation for securing distributed Kubernetes clusters, featuring Sicredi's evaluation process, comparison with other service meshes, and practical application of security policies.
Explore Kubernetes cluster security, focusing on initial access vectors. Learn about authentication methods, potential vulnerabilities, and real-world attack scenarios. Gain insights on detection strategies using cloud and audit logs.
Explore VEX implementation for container image security, addressing European legislation and enhancing software supply chain resilience through machine-readable vulnerability management.
Explore Cell-Based Architecture for scalable, secure multi-tenant Kubernetes environments. Learn practical applications, real-world case studies, and how to enhance security, isolation, and performance using open-source technologies.
Get personalized course recommendations, track subjects and courses with reminders, and more.