Courses from 1000+ universities
Scaler Academy projected $200M in revenue but delivered only a fraction. Class Central’s exclusive analysis reveals another major EdTech deception in India
600 Free Google Certifications
Web Development
Project Management
Graphic Design
Gender and Sexuality: Applications in Society
Learning How To Learn for Youth
English in Early Childhood: Language Learning and Development
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive introduction to cybersecurity fundamentals covering information assurance, risk management, security controls, governance, and ethics. Ideal for IT professionals and students seeking entry-level certification.
Explore incident response, business continuity, and disaster recovery concepts to maintain availability of resources and ensure organizational survival during disruptions.
Comprehensive overview of network security fundamentals, covering concepts, threats, infrastructure, and protection strategies for IT professionals and aspiring cybersecurity leaders.
Explore day-to-day security operations, including data protection, encryption, asset management, policies, and security awareness training for effective cybersecurity implementation.
Comprehensive exploration of physical and logical access controls, covering key concepts, administrative measures, and practical implementation for enhancing organizational security.
Explore cryptography's impact on data security, covering techniques like hashing, encryption, and digital signatures. Learn to implement secure protocols and manage keys effectively.
Explore core security concepts, ethics, controls, asset management, and physical security. Gain essential knowledge for implementing and maintaining robust information security practices.
Explore incident response, forensic investigations, and business continuity planning. Learn to identify response policies, support investigations, and contribute to disaster recovery efforts.
Master network security fundamentals through OSI and TCP/IP models, learn to identify threats, implement security controls, and configure protective devices for secure network environments.
Explore authentication methods, trust, identity management, and access control models to ensure secure system and data access for authorized users only.
Explore risk management for information systems, focusing on continuous maturity modeling, measuring, and monitoring. Learn to identify vulnerabilities, implement frameworks, and analyze security posture in day-to-day operations.
Explore malware types, countermeasures, and social engineering. Learn endpoint security, mobile device management, and cloud security models. Master virtualization technologies and strategies for secure cloud environments.
Explore information security and technology in healthcare, covering data protection, EHRs, telemedicine, and risk management. Gain insights into healthcare environments, data management, and secure third-party connectivity.
Explore essential security and privacy principles for healthcare organizations, focusing on safeguarding patient data and sensitive information handling.
Master risk management in healthcare settings, focusing on information security, privacy, and patient safety. Learn frameworks, assessment processes, and control procedures for effective risk mitigation and continuous monitoring.
Get personalized course recommendations, track subjects and courses with reminders, and more.