Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Software Development
Computer Networking
Working with Translation: Theory and Practice
Supporting Successful Learning in Primary School
Product Management Essentials
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Exploring security risks in IoT devices, from cars to toys, and discussing challenges and new directions for enhancing digital and physical security in everyday technology.
Explore the journey of security features from concept to deployment, examining successful implementations and abandoned ideas in the tech industry, with insights from BlackBerry's research.
Exploring how cybersecurity games can address the skills gap by making security education more engaging, creative, and socially relevant. Discusses the potential and limitations of game-based learning in computer security.
Exploring cybersecurity risks in medical devices, this talk covers regulatory issues, international standards, and the balance between innovation and patient safety in software-dependent healthcare technology.
Kritische Analyse der Sicherheitslücken in Smart-Building-Systemen: Angriffsmöglichkeiten und Schutzmaßnahmen für moderne Gebäudeautomation werden praxisnah beleuchtet.
Leveraging service discovery for transparent network segmentation using mutual TLS, enhancing security without disrupting development or requiring downtime. Lessons from implementing strong access controls at scale.
Rückblick und Ausblick auf IT-Sicherheitstrends: Neue Entwicklungen, Buzzwords und potenzielle Bedrohungen für 2019 und darüber hinaus werden kritisch beleuchtet und diskutiert.
Dissecting Sigfox's IoT network protocol, revealing security vulnerabilities and presenting an open-source alternative. Explores radio technology, cryptography, and potential attacks on this emerging low-power wide-area network.
Evolution of enterprise security: from traditional methods to automated attacks. Explores sophisticated tactics, tools, and techniques reshaping Active Directory vulnerabilities and domain privilege escalation.
Explore AI, machine learning, and deep learning in cybersecurity through a lively debate. Experts discuss vendor claims, organizational readiness, and future implications, inviting audience participation.
Explore mobile network security measures and hackers' evolving techniques to bypass them. Learn about SMS Home Routing, signaling firewalls, and sophisticated attack methods in this insightful talk.
Explore innovative approaches to web application security beyond traditional WAFs, focusing on internal application monitoring and real-time threat detection to prevent zero-day attacks and data exfiltration.
Discover techniques to measure and compare the effectiveness of security tools, holding vendors accountable. Learn to evaluate IDS, IPS, A/V, and other detection systems for better cybersecurity decision-making.
Explore SVG's security implications, potential vulnerabilities, and protective measures. Learn about malicious SVG examples and a new filtering tool for safer SVG usage on the web.
Comprehensive security assessment of IPv6 protocol suite, highlighting vulnerabilities, implementation challenges, and best practices for secure deployment in modern networks.
Get personalized course recommendations, track subjects and courses with reminders, and more.