Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Software Development
Computer Networking
Working with Translation: Theory and Practice
Supporting Successful Learning in Primary School
Product Management Essentials
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Explore methods to measure and enhance security approaches, enabling business growth and improved protection against evolving threats in today's complex cybersecurity landscape.
Exploring opportunity cost in security decision-making to transform programs from organizational drags to uplifting forces, considering tangible and intangible costs beyond monetary aspects.
Exploring legal and practical strategies for AI auditors to overcome barriers in testing algorithmic bias, drawing lessons from security testing practices and advocating for policy changes.
Explores how geopolitical changes impact computer security and privacy for vulnerable populations, examining case studies and recommending design strategies to reduce vulnerability during times of crisis and change.
Exploring contextual security solutions to overcome limitations of machine learning in cybersecurity, using knowledge graphs for improved threat intelligence and explanation-based security.
Exploring hCaptcha's accessibility workflow, its privacy implications, and security vulnerabilities. Discusses the future of CAPTCHAs and the challenge of balancing inclusivity with security in online verification systems.
Explore adversarial data mining techniques in cybersecurity, focusing on big data challenges and solutions for detecting and mitigating threats in complex digital environments.
Explore privacy and security challenges in genomics with experts Erman Ayday and Jean-Pierre Hubaux, addressing crucial issues in the era of widespread genetic data use and sharing.
Explore security threats of dangling DNS records, understanding vulnerabilities and potential exploits in domain name systems.
Explore the provable security of (EC)DSA signatures, examining theoretical foundations and practical implications for cryptographic systems.
Explores security and usability of segment-based visual cryptographic authentication, analyzing protocols for effectiveness in balancing protection and user experience.
Explore security vulnerabilities in embedded systems, focusing on real-world examples and practical attack scenarios. Learn about potential risks and strategies for enhancing embedded system security.
Explore findings from a census-representative survey on security advice sources and behavior, revealing insights into how people learn and implement digital safety practices.
Explore Riot Games' innovative approach to cybersecurity, focusing on scalable solutions, threat modeling, and fostering a security-conscious culture within the gaming industry.
Explore IPv6 security challenges, recent advancements, and best practices for secure deployment. Learn about potential vulnerabilities, attack vectors, and mitigation strategies in IPv6 networks.
Get personalized course recommendations, track subjects and courses with reminders, and more.