Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Public Health
Software Development
Learning How To Learn for Youth
Preparing to Manage Human Resources
Ableton Live Course: Sound Production for Musicians and Artists
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Comprehensive overview of cloud security, covering risks, challenges, principles, automation, and career prospects. Insights from an experienced executive director in the field.
Comprehensive guide to CISSP Domain 1, covering risk management, threat modeling, and security awareness. Expert insights for exam preparation and practical application in information security.
Comprehensive guide to cloud security interviews, covering key skills, certifications, resume tips, job descriptions, and sample questions to help candidates prepare effectively.
Explore Azure Storage Account security, authentication methods, and automated key rotation in this comprehensive webinar. Learn about key vaults, event grids, and Azure functions for enhanced cloud storage management.
Learn to program an ESP32-CAM for versatile camera projects: timelapse, motion-triggered, remote-controlled. Covers hardware setup, wiring, and Arduino IDE coding for wildlife, security, and custom applications.
Learn to create a high-tech escape room puzzle using Unity, Arduino, and MQTT. Build a security terminal that controls door locks and LED lights, perfect for spy or space-themed adventures.
Learn to remotely control a Raspberry Pi security system using Putty, enabling remote access and management of your project for enhanced functionality and convenience.
Learn 5 best practices for React data security, including disabling dev tools, managing state storage, encrypting passwords, and utilizing JWTs effectively for secure logins and data handling.
Explore lattice-based cryptography's foundations, quantum resistance, and encrypted data computation capabilities in this lecture on modern cryptographic techniques and applications.
Explore security through human behavior, examining its intersection with machine learning and economics. Gain insights into valuable skills for understanding and improving digital safety.
Explore strategies for resilient enterprise security operations, focusing on informed decision-making during critical incidents like ransomware attacks. Learn about risk indicators and active defense techniques.
Explore Windows 10 security questions vulnerability, offering insights on exploiting this feature for persistent access and domain-wide compromise.
Explore limitations of machine learning in cybersecurity, dangers of blind algorithm application, and alternative approaches like probabilistic inference for more effective threat detection and analysis.
Explore challenges and solutions in operationalizing a Security Operations Center, covering threat hunting, behavioral analytics, and rapid product deployment for enhanced cybersecurity.
Explore how defenders can leverage graph-based thinking to strengthen security in domain environments, adapting to sophisticated attackers and enhancing prevention, detection, and investigation strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.