Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Computer Networking
Ethical Hacking
Terrorism and Counterterrorism: Comparing Theory and Practice
Product Management Essentials
Biochemistry: Biomolecules, Methods, and Mechanisms
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Explore DoD-level security principles for private sector implementation, addressing common misconceptions and emphasizing foundational data protection concepts for effective cybersecurity strategies.
Unveiling critical vulnerabilities in security products that allow bypassing Windows protections. Explores impact, solutions, and provides a validation tool for system security.
Explore emerging best practices in software supply chain security, analyzing guidelines from major organizations to compile key strategies for mitigating risks in deployment pipelines.
Explore the development of baseline security standards for endpoint devices in a Zero Trust Network implementation, focusing on OS security capabilities and threat vector identification.
Learn strategies for preparing infrastructure and ensuring business continuity during crises, drawing from MacPaw's experience operating in Kyiv during the Russian invasion of Ukraine.
Discover strategies to enhance DevSecOps and protect against software supply chain attacks using real-world examples and the OSCAR framework. Learn to assess and improve your organization's security practices.
Explore security vulnerabilities in low-code/no-code apps, learn about the OWASP Top 10 list, and gain insights from real-world examples to enhance application security in modern development environments.
Exploring the critical need for technologists in shaping public policy for computer security and Internet governance, emphasizing the importance of their involvement in policy discussions.
Explore SOAR techniques for automated threat analysis and response. Learn from Aflac's early approach to efficiently block millions of potential exploits and implement effective automation steps.
Explore autonomous security's role in modern threat landscapes, featuring insights from Oracle-KPMG threat report and strategies for revolutionizing enterprise data protection.
Explore IoT identity management challenges, opportunities, and solutions for seamless authentication, robust security, and user-controlled privacy across diverse devices and platforms.
Expert panel explores the complex relationship between privacy and security, discussing challenges beyond encryption and proposing solutions to break the current stalemate in digital policy debates.
Explore the evolution of cybersecurity threats and the future of Security Operations Centers, focusing on extended risk management across supply chains, ecosystems, and customer touchpoints.
Explore methods to measure and enhance security approaches, enabling business growth and improved protection against evolving threats in today's complex cybersecurity landscape.
Exploring opportunity cost in security decision-making to transform programs from organizational drags to uplifting forces, considering tangible and intangible costs beyond monetary aspects.
Get personalized course recommendations, track subjects and courses with reminders, and more.