Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Computer Networking
Ethical Hacking
Terrorism and Counterterrorism: Comparing Theory and Practice
Product Management Essentials
Biochemistry: Biomolecules, Methods, and Mechanisms
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn Network Security, earn certificates with free online courses from Stanford, MIT, Johns Hopkins, UC Irvine and other top universities around the world. Read reviews to decide if a class is right for you.
pfSense provides network firewall, VPN, and other services to users and network operators. It offers IP and port blocking, VPN termination, and DHCP and DNS services. In this course, you'll learn to detect and block adversary activity using pfSense.
In this course, you will gain the knowledge to implement the new approach to securing your network infrastructure and applications using the software-defined perimeter approach to zero trust (SDP). SDP makes protected assets invisible.
Many engineers struggle with IP multicast. This IGMP and MLD deep dive builds a strong foundation into host-to-router multicast signaling. It includes extensive demonstrations, packet capture deep-dives, and troubleshooting techniques.
Pluralsight is not an official partner or accredited training center of EC-Council. This course covers network scanning and monitoring techniques to ensure optimal network performance and to identity network security breaches.
Certain tasks are always faster and more flexible at the command line, while some can only be performed there. Wireshark is no different. You will learn how to use Wireshark command line tools such as tshark, dumpcap, editcap, and mergecap.
Learn to configure and manage Check Point's Quantum Network Security solution, covering installation, policy creation, threat prevention, and essential security features for comprehensive network protection.
Do you want to learn how to capture, read, and interpret packets within your network? Discover packet analysis tools and interpret information in a datagram.
So, CrowdStrike blew up the internet! But what really happened and why was the impact so big? We’ll take you through the what, how and why of the CrowdStrike outage and cover some lessons we can all learn from the event.
For professional penetration testers who want to take their skills to the next level using the Metasploit framework. This is a hands-on course that will show you in a different angle the penetration testing workflow and how to apply it in practice.
Sophisticated adversaries have routinely demonstrated the ability to compromise enterprise networks and remain hidden for extended periods of time. This course will teach you how to dig deep into network traffic utilizing Suricata.
Maximizing Nmap for Security Auditing is the third course in the Nmap series where you will learn how to leverage the Nmap Scripting Engine, write custom scripts, and automate security auditing tasks.
This course will teach you about the products and service Fortinet can offer you and compare them to other more prominent vendors in the marketplace.
Build your knowledge and understanding of computer networks as a computer science teacher.
Learn to audit Azure IaaS environments, focusing on security, performance, support, and cost. Explore common pitfalls, SLAs, and key Azure services to enhance your enterprise solutions.
Network analysis is an efficient monitoring mechanism to thwart malicious attacks on servers from blacklisted sources. In this course, you will learn how to monitor these sources and detect these threats using Maltrail.
Get personalized course recommendations, track subjects and courses with reminders, and more.