Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Learn how to plan your expenses and invest in achieving financial security.
Join us for an extraordinary learning experience at the Summer School 2024: Microsoft Skills Bootcamp - Where Your Tech Future Begins this December 2024.
Master personnel security clearance management, adjudication guidelines, and investigative processes to safeguard sensitive information and ensure proper security protocols.
Discover actionable counterintelligence tools to detect insider threats, foreign espionage, and cyber attacks targeting sensitive U.S. government and industry information systems.
Explore federal personnel security adjudication processes, eligibility determinations, security clearances, and merit fraud detection for HR and security professionals.
Unlock counterintelligence fundamentals to protect critical information from espionage, cyber threats, insider risks, and domestic terrorism targeting cleared professionals.
Master essential techniques for conducting federal personnel security interviews, covering legal requirements, adjudicative guidelines, and professional interviewing skills.
Master cybersecurity analysis with CompTIA CySA+ training covering risk assessment, threat analysis, incident response, vulnerability management, and forensic investigation techniques.
Master comprehensive physical and cyber security strategies to protect federal personnel, assets, and information from espionage, terrorism, and insider threats effectively.
Dive into Bluetooth and BLE architecture, protocols, security measures, and attack vectors with hands-on Wireshark analysis and practical tools demonstration.
Explore RFID and NFC security vulnerabilities, attack vectors, and defense strategies through hands-on exploitation techniques and countermeasures analysis.
Master wireless protocol security through hands-on analysis of Bluetooth, Wi-Fi, and ZigBee vulnerabilities, exploitation techniques, and defense strategies for real-world scenarios.
Master advanced federal IT management skills including cybersecurity, performance assurance, and technology modernization for senior-level program managers.
Explore healthcare data security, privacy, and compliance, focusing on HIPAA, data protection, encryption, cloud computing, and healthcare laws. Gain essential skills for Health IT Support roles.
Master advanced network security through hands-on experience with protocols, threat analysis, and defensive tools like Wireshark and Splunk. Develop practical skills in traffic monitoring, vulnerability assessment, and implementing robust security measur…
Get personalized course recommendations, track subjects and courses with reminders, and more.