Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Computer Networking
Ethical Hacking
Terrorism and Counterterrorism: Comparing Theory and Practice
Product Management Essentials
Biochemistry: Biomolecules, Methods, and Mechanisms
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Expertos discuten soluciones de Microsoft para proteger aplicaciones y recursos en entornos multicloud, incluyendo Azure Defender, Security Center, MCAT y Sentinel. Ofrecen mejores prácticas y capacidades de automatización.
Integrate Recorded Future with Azure Sentinel to quickly identify, prioritize, and action threats using external threat intelligence, maximizing existing security investments.
Comprehensive overview of Microsoft's Cloud Security solutions for protecting multi-cloud and hybrid environments, covering IaaS, PaaS, and SaaS services with latest capabilities and strategies.
Explore Microsoft Surface's unified approach to firmware protection and device security, enhancing workplace safety in hybrid environments through innovative hardware and software solutions.
Explore security and compliance features in Microsoft Teams, covering policy management, content protection, retention, and communication compliance for secure collaboration.
Explore the evolving landscape of cybersecurity and national defense with insights from U.S. Cyber Command and NSA leadership on strategies, challenges, and future directions.
Explore the rise of ISIL, its impact on homeland security, and strategies to combat violent extremism with insights from the DHS Secretary.
Explore the future of liberty, privacy, and national security in 2024. Experts discuss technology's impact, democracy, transparency, and potential risks to American freedoms.
Exploring technical strategies for data sharing in public interest research while complying with privacy regulations, addressing challenges and proposing industry standards.
Explore building robust machine learning systems for malware detection, addressing challenges like low false positive rates, polluted data, and realistic adversarial attacks in security applications.
Explore the challenges and solutions of managing third-party integrations in microservice architectures, focusing on risk analysis, security visibility, and creating a comprehensive organizational risk map.
Exploring Stack Overflow's dual impact on software security: potential vulnerabilities and effective solutions. Highlights research findings and proposes design tweaks to enhance secure development practices.
Explores security and privacy challenges in K-12 classrooms, highlighting the need for child-specific design in authentication, permissions, and data protection to ensure safe and effective educational technology use.
Exploring system operators' perspectives on security misconfigurations, analyzing root causes, and providing practical recommendations to reduce their frequency and impact in organizations.
Explores interpersonal threat modeling for consumer technology, addressing security concerns from cohabitants and shared devices. Challenges traditional assumptions to better protect individuals and at-risk populations.
Get personalized course recommendations, track subjects and courses with reminders, and more.