Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Management & Leadership
Information Technology
Astrobiology and the Search for Extraterrestrial Life
Dino 101: Dinosaur Paleobiology
Cybersecurity Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Explore automotive cybersecurity trends, challenges, and solutions. Learn about car hacking, attack surfaces, network vulnerabilities, and protective measures for safer connected vehicles.
Explore security challenges in wireless and mobile systems, focusing on jamming, tracking, and softwarization. Learn about emerging threats and potential solutions in this evolving field.
Explore secure hybrid cloud deployments using Apache Traffic Server, Athenz, and Waflz. Learn options for Secure Edge integration, policy enforcement, and lessons from real-world implementation at Yahoo.
Explore how cloud migration enhances application and data security at scale, discussing modern challenges, event-driven security, and AWS guardrails for improved organizational security posture.
Explore Chrome's security features, threats, and protective measures. Learn about browser exploits, phishing, SSL attacks, and defense strategies from Google's "Security Princess".
Explore CPU architecture vulnerabilities, focusing on Meltdown and Spectre attacks. Learn about the Mill architecture's unique approach to performance and security without hardware speculation.
Explore classic game console security measures, their exploits, and lessons for modern software. Journey through gaming history to understand hardware, media, and software protection techniques.
Explore statistical approaches for cyber-security, from micro-level models to full network graph representations, to identify illegitimate network activity using enterprise data sources.
Explore advanced system architectures, performance optimization, and security concerns in layered systems. Learn debugging techniques and architectural strategies for addressing bottlenecks and vulnerabilities.
Explore vector similarity search techniques to combat alert fatigue in cybersecurity, enhancing operational efficiency and decision-making for security analysts.
Explore challenges and strategies for securing interconnected cyber-physical systems, focusing on machine learning, smartphone security, and AI trustworthiness in our increasingly digital world.
Explore the history, evolution, and future of INSuRE, a cybersecurity research and education program, including its mission, challenges, and impact on students and government agencies.
Explore the intriguing connection between personality traits and cybersecurity behaviors, examining how emotions influence our online safety decisions and practices.
Overview of INSuRE program: mission, execution, benefits, challenges, and future aspirations in information security research and education collaboration between universities and government agencies.
Análisis de seguridad de la biblioteca de anuncios polÃticos de Facebook, examinando la efectividad de las polÃticas de transparencia y divulgación implementadas tras las controversias electorales de 2016.
Get personalized course recommendations, track subjects and courses with reminders, and more.