Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Data Analysis
Managing Conflicts on Projects with Cultural and Emotional Intelligence
Quantum Mechanics for Everyone
Mountains 101
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Explore Rust, security, and tech trends with experts. Dive into Rust utilities, WebAssembly, SMS vulnerabilities, fiber expansion, Flutter 2.0, deepfake detection, and more in this informative discussion.
Explore enterprise-level security practices for Azure Databricks, covering RBAC, network isolation, and Azure-specific features to deploy and manage secure analytics and AI environments.
Learn fundamentals of governance and security for cloud data platforms, covering identity management, private links, access monitoring, cost control, and policy enforcement for workspaces.
Explore advanced security threat detection using Apache Spark and Databricks. Learn about innovative solutions for notebook-based testing, self-tuning alerts, automated investigations, and custom SDK development for enhanced cybersecurity.
Explore challenges and strategies for securing interconnected cyber-physical systems, focusing on machine learning, smartphone security, and AI trustworthiness in our increasingly digital world.
Explore the history, evolution, and future of INSuRE, a cybersecurity research and education program, including its mission, challenges, and impact on students and government agencies.
Explore the intriguing connection between personality traits and cybersecurity behaviors, examining how emotions influence our online safety decisions and practices.
Overview of INSuRE program: mission, execution, benefits, challenges, and future aspirations in information security research and education collaboration between universities and government agencies.
Análisis de seguridad de la biblioteca de anuncios polÃticos de Facebook, examinando la efectividad de las polÃticas de transparencia y divulgación implementadas tras las controversias electorales de 2016.
Explore automated implementation of Windows security guides using NLP and verification techniques. Learn about extraction, research questions, and current limitations in this field.
Explore cutting-edge research in information-centric networking, covering DDoS countermeasures, liquid data networking, and named-data transport for the future Internet architecture.
Explore LEMNA, a novel technique for explaining deep learning models in security applications, addressing transparency concerns and improving interpretability for critical decisions.
Explore system operators' views on security misconfigurations, their causes, and potential solutions in this insightful investigation of cybersecurity practices and incident prevention.
Revisiting GCM's multi-user security with new concrete bounds, focusing on nonce re-use across users and re-keying impacts. Provides refined parameterization of adversarial resources for improved security analysis.
Explore techniques for building secure software through bytecode mutation, including obfuscation, encryption, and cross-compilation to protect against reverse engineering and enhance product security.
Get personalized course recommendations, track subjects and courses with reminders, and more.