Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Computer Networking
Ethical Hacking
Terrorism and Counterterrorism: Comparing Theory and Practice
Product Management Essentials
Biochemistry: Biomolecules, Methods, and Mechanisms
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Evaluación de la efectividad de la PolÃtica de Seguridad de Contenido en la práctica, analizando su adopción, configuración y debilidades frente a ataques XSS.
Comprehensive formal security analysis of OAuth 2.0, examining authorization, authentication, and session integrity properties, and discussing potential attacks and mitigations.
Explore automated feature engineering for malware detection using security literature mining, enhancing detection accuracy and providing explainable results.
Explore black-box enforcement of Content Security Policy on websites, covering deployment, training, rewriting, and evaluation of CSPAutoGen for enhanced web security.
Explore Chrome's process-based sandboxing, its security implications, and potential vulnerabilities in web browser architecture. Learn about attacks exploiting the fuzzy web/local boundary.
Explore practical security vulnerabilities in 64-bit block ciphers, focusing on collision attacks in HTTP over TLS and OpenVPN. Learn about countermeasures and implications for network security.
Explore the trade-offs between security and consistency in transaction scheduling, with real-world examples and attack demonstrations in information flow control systems.
Explores data reduction techniques for big data security dependency analyses, focusing on expendable dependencies, controlled loss, and domain knowledge to improve efficiency while maintaining accuracy.
Explore Android app security, focusing on third-party library detection, fragmentation issues, and vulnerability identification in mobile applications.
Explore Android Unix domain socket vulnerabilities, their security implications, and mitigation strategies in this comprehensive analysis of potential misuse and authentication weaknesses.
Martin Hellman explores cybersecurity, nuclear security, and logical paradoxes, drawing connections between cryptography, national security, and mathematical logic while reflecting on his career and the broader implications of technology.
Exploring Trump's foreign policy, its impact on global relations, and complex national security challenges. Experts discuss America's role, leadership vacuum, and potential consequences of 'America First' strategy.
Explore national security challenges, including Guantanamo, terrorism trials, private sector involvement, and balancing security with liberty. Experts discuss military responses versus human rights approaches.
Explore security-focused hybrid environments with Microsoft and Red Hat. Learn about integrated solutions, joint support, and unified management for tackling modern IT challenges and adapting to future changes.
Explore latest Teams features for secure remote work, data protection, safe meetings, and compliance across global regulations. Learn to leverage Microsoft 365 intelligence within Teams.
Get personalized course recommendations, track subjects and courses with reminders, and more.