Tallo logoTallo logo

Courses

Discover thousands of courses from top institutions and platforms worldwide

7,657 Courses Found

Sort by:
  • Newest First
  • Highest Rated
  • Most Reviewed
  • A to Z
  • Z to A
  • Price: Low to High
  • Price: High to Low
  • Duration: Short to Long
  • Duration: Long to Short
Multi-Layer Defense for Scalable Threat Mitigation course thumbnail
FREE

YouTube

Multi-Layer Defense for Scalable Threat Mitigation

Cloud Security
Cloud Computing
Network Security

Learn comprehensive multi-layer defense strategies for scalable threat mitigation in cloud-native environments through this 12-minute conference talk from Conf42 Cloud Native 2025. Explore the fundamental need for multi-layered security approaches and discover the core components that form an effective security framework. Examine current challenges in cloud security and understand how to implement proactive security strategies that anticipate and prevent threats before they materialize. Dive deep into network security principles and zero trust architecture implementation, covering how these approaches create robust perimeters around cloud resources. Master authentication and authorization mechanisms that ensure only legitimate users and services can access critical systems. Understand API security best practices and monitoring techniques essential for protecting service-to-service communications in distributed architectures. Discover advanced analytics and threat detection methodologies that leverage machine learning and behavioral analysis to identify sophisticated attacks. Learn resilience and recovery strategies that ensure business continuity even when security incidents occur. Analyze the financial and reputational benefits of implementing comprehensive multi-layer security, including cost savings from prevented breaches and enhanced customer trust. Gain insights into future security trends and emerging technologies that will shape the next generation of cloud-native threat mitigation strategies.

Women's Self Defense Tips - Self Defence for Women Safety course thumbnail
FREE

Udemy

Women's Self Defense Tips - Self Defence for Women Safety

Empowerment
Awareness
Threat Identification

Self Defense for Women in The Modern World. Protect yourself and Learn Some Moves. Don't be a victim! Feel safe again! What you'll learn: Learn to increase your level of awareness in every day life by learning fun drills and exercise that will allow you to identify and avoid a possible threat in any environment.The difference between a fight, and a self-defense situation This course is simply the ideal course to learn guard in a brisk, simple and straightforward way. Practice the substance we show you in this course, and you'll have a useful aptitude in a matter of a couple of hours. The course is displayed in an unmistakable and brief technique with point by point data. The procedures we show you in this course are the center standards you NEED to know in self preservation. We won't show you convoluted procedures and favor developments that just don't work. This program was composed and actualized for ladies' security around the world. The main issue to our course is that it is intended to spare lives and give every understudy a true, work, usable, repeatable ability. Our program is tied in with understanding the flow of vicious violations against ladies, the study of human life systems, and giving you an answer through natural, high use procedures and strategies that anybody can do.

Introduction to Browser Security Headers course thumbnail

Pluralsight

Certificate

Introduction to Browser Security Headers

Browser Security
Web Security
Cybersecurity

Security is all about defense in depth: applying layer upon layer of security controls such that any one single failure does not lead to a compromise of the application. One of those layers is the browser itself, which is becoming increasingly intelligent when it comes to implementing defenses. Security headers are a way of telling the browser how a website may behave when it’s loaded into the client. They provide numerous defenses against a variety of attacks in ways that have not previously been possible with security controls that ran solely on the server. In this course, we’ll walk through a number of essential security headers that provide even greater levels of defense for web applications. We’ll look at how they’re intended to work, what attacks they protect against, and how you can easily implement them in your website.

Lawyer Up Preview course thumbnail
FREE

YouTube

Lawyer Up Preview

Board Games
Games
Game Mechanics

This course provides a preview runthrough of the board game Lawyer Up. By watching the gameplay and final thoughts videos, learners will gain an understanding of how the game is played and strategies for success. The course aims to familiarize participants with the rules and mechanics of Lawyer Up. This course is suitable for board game enthusiasts interested in learning about Lawyer Up before playing.

Inventing Defense course thumbnail
FREE

YouTube

Inventing Defense

BruCON
Cybersecurity
Storytelling

Explore the evolution and challenges of cybersecurity defense in this thought-provoking keynote address from BruCON 0x08. Delve into the origins of defense strategies, examine the Defenders Dilemma, and draw parallels from ancient myths to modern security practices. Gain insights into the journey of cybersecurity professionals, the complexities of defending against evolving threats, and the importance of storytelling in shaping our understanding of digital protection. Through interactive elements and engaging analogies, discover new perspectives on inventing and reimagining defense mechanisms in the ever-changing landscape of information security.

Sicilian Defense course thumbnail
FREE

YouTube

Sicilian Defense

Chess
Sports
Strategy

Learn the fundamentals of the Sicilian Defense, starting with the beginner-friendly Kneivis variation. Explore key patterns and strategies of this powerful opening, gaining a solid foundation for more complex variations. Delve into the Hedgehog Variation and master endgame techniques specific to Sicilian Defense positions. This comprehensive chess lesson series provides a step-by-step approach to understanding and implementing one of the most popular and dynamic responses to White's 1.e4.

Lawyer - AI = 0 ? course thumbnail
FREE

YouTube

Lawyer - AI = 0 ?

TEDx
Big Data
Online Platforms

Explore the evolving landscape of legal practice in this 23-minute TEDxHepingPark talk by Sibo Qing, a practicing lawyer in China and New York State. Discover how technological advancements are transforming the legal profession, shifting from traditional offline methods to online platforms and leveraging big data. Gain insights into the future of law, where change is the only constant. Learn about corporate advisory legal services, equity design, private equity funds, mergers and acquisitions, and international investment from an experienced professional. Understand the impact of AI on the legal field and how lawyers can adapt to remain relevant in an increasingly digital world.

Phishing Attacks & Defense course thumbnail

Udemy

Certificate

Phishing Attacks & Defense

Cybersecurity
Vulnerability Assessment
Defense Strategies

Learn how to defend against one of the most prevalent and dangerous forms of cyber attacks today What you'll learn: Discover what phishing REALLY is and why it's so dangerous todayRecognize the various types of phishing attacks and the motivations behind themUnderstand the vulnerabilities in people that phishing attacks are designed to exploitSee how phishing attacks are carried out and what they are capable of doing (through actual demonstrations)Learn a totally new (low-tech) method for recognizing and defending against phishing attacks Phishing is one of the most prevalent and dangerous forms of cyber attacks today. It impacts individuals and organizations all over the world, and even some of the most widely publicized (and damaging) data breaches / ransomware infections all started with a successful phishing attack. Given the massive role that phishing has had in recent (and historical) high profile cyberattacks it would be reasonable to conclude that its "days are numbered". Unfortunately, the opposite appears to be true with phishing attacks continuing to grow in number and sophistication every day. This course will help you understand exactly what phishing is (and where it all started), how phishing works (through live hacking demonstrations), and how to defend against it (using a new "low-tech" approach you've likely never seen before)! No advanced technical knowledge is required, and if you've ever sent or received an email before you're ready to take the course! No matter who you are, learning to defend against phishing attacks is one of the smartest investments you can possibly make when it comes to cyber self-defense, and the skills you learn in this course are likely to serve you well into the future. If you're and employer, providing this training to employees serves as a "win-win" as the skills they learn in this course can easily be applied to their personal lives as well as their professional ones. To summarize, there has never been a better time to develop the skills needed to recognize and defend against phishing attacks, and this concise and engaging course was created to help you do just that!

Active Defense Untangled course thumbnail
FREE

YouTube

Active Defense Untangled

DefCamp
Cybersecurity
Incident Response

Explore the concept of active defense in cybersecurity through this 25-minute conference talk from DefCamp 2017. Delve into the intricacies of proactive security measures and their implementation in modern information security practices. Gain insights from industry experts as they untangle the complexities of active defense strategies, discussing their effectiveness, legal implications, and practical applications. Learn how organizations can enhance their security posture by adopting a more dynamic approach to threat mitigation. Discover the latest research and hands-on techniques shared at one of Central and Eastern Europe's most important hacking and information security conferences. Access additional resources, including presentation slides and related materials, through the provided DefCamp archive link to further expand your understanding of active defense in the ever-evolving cybersecurity landscape.

Threat Informed Defense course thumbnail
FREE

YouTube

Threat Informed Defense

RSA Conference
Cybersecurity
Tactics

Explore Threat Informed Defense, an efficient approach for overwhelmed security teams, in this 45-minute webcast from RSA Conference. Learn how to create a threat model using community-gathered intelligence and leverage technique or behavior-based detections. Discover strategies for enterprise defenders to protect evolving organizations against complex threats like ransomware groups and nation-state espionage. Delve into topics such as the Pyramid of Pain, threat actors, tactics, techniques, and attack frameworks. Gain insights on finding and tracking threat actors, using open-source tools, and implementing a threat detection lifecycle. Join Fred Stankowski, Director of Security Operations at Box's Global Security Office, as he guides you through prioritizing and focusing cybersecurity efforts to make the most efficient use of resources in a rapidly changing threat landscape.

Defense Evasion Modeling course thumbnail
FREE

YouTube

Defense Evasion Modeling

Security BSides
Cybersecurity
Threat Modeling

Explore defense evasion modeling techniques in this 57-minute conference talk from BSidesLV 2013. Delve into new technologies, development processes, and tools for layered security. Evaluate the effectiveness of your defenses through threat modeling, transforms, and tuning of various security components including IPS, NGFW, and endpoint protection. Examine corporate infrastructure, exploit techniques, and threat protection strategies. Gain insights into NSS and macro approaches for enhancing overall security posture.

ICS SCADA Defense course thumbnail
FREE

YouTube

ICS SCADA Defense

Cybersecurity
Network Security
SCADA

Explore industrial control system (ICS) and SCADA defense strategies in this comprehensive conference talk from BSides Augusta 2014. Delve into risk assessment methodologies, vulnerability mitigation techniques, and best practices for securing critical infrastructure. Learn about robust device configurations, network segmentation, protocol-aware security tools, and the importance of physical security measures. Discover how to implement defense-in-depth strategies, including software patching, DNP3 Secure Authentication, and network monitoring. Gain insights on employee awareness training and the significance of third-party testing for SCADA systems. Understand why compliance alone is insufficient for security and why proactive defense is crucial for protecting industrial control systems across various protocols beyond DNP3.

Angular Weapon Defense course thumbnail
FREE

YouTube

Angular Weapon Defense

ng-conf
Web Development
Javascript

Explore Angular weapon defense techniques in this 20-minute conference talk from NG-Conf 2014. Learn from experts Tom Valletta and Gabe Dayley as they delve into strategies for protecting Angular applications from potential vulnerabilities and attacks. Gain valuable insights on enhancing the security of your Angular projects, understanding common threats, and implementing robust defense mechanisms. Discover best practices and cutting-edge techniques to fortify your Angular applications against malicious activities. Benefit from the knowledge shared by experienced developers at this premier Angular conference, designed to provide high-quality training and networking opportunities for JavaScript developers.

Cybrary

Certificate

Web Defense Fundamentals

Cybersecurity
SQL Injection
Web Application Security

In Web Defense Fundamentals, Ken Underhill takes you through the different aspects of Web application Security. You will learn OWASP top 10 and the vulnerabilities that are found across the web applications. Detection and remediation for OWASP top 10 are covered. By learning this course, organizations and individuals can ensure that their web applications are safely deployed and secure against the prying eyes of hackers, ensuring that industrial standards of Open Web Application Security Project (OWASP) are met. Businesses and organizations want to deploy their web applications safely for consumer use, while protecting against hackers simultaneously. Organizations will be more likely to employ developers who understand the industry standards of the Open Web Application Security Project (OWASP). Developers who earn OWASP certification will have a vast array of tools to protect an organization from online hackers. Developers who take Web Application Security Training can provide a strong Web Defense to their personal content or a business or organization’s website that is consumer facing. What Is Web Defense? Web Defense protects a company or organization’s users when they are browsing the internet. Developers who practice good Web Defense learn how to approach the various vulnerabilities that can be found in web applications and employ strong protections within the application’s code. Why Is Web Application Security Important? Businesses need Web Application Security because protecting customer or user information is good business. Protecting customer information helps ensure consumer trust. Hackers target highly vulnerable organizations, so practicing good Web Application Security is essential. If hackers perform a data breach on a company and steal customer information, once consumers find out, they will lose trust in the organization and likely won’t return for additional business. Lost trust results in a tainted reputation and even lost revenue for the targeted business or organization. In 2018, any website without SSL (HTTPS) was marked “insecure.” Without the proper steps to secure a website, even new users or customers will feel hesitant to even browse the content because they’ve been warned the site may be insecure. Hacker attacks are on the rise, with one happening every 39 seconds, according to Security Magazine. These frequent attacks result in about 50,000 hacked websites every day. Most of these sites are small businesses unintentionally sending malicious code for hackers. However, the best defense is often the best offense. Having proper security in place helps discourage hackers. Attacks often fail, further demonstrating the need for proper protection. Sucuri, a cloud-based firewall provider, reported it tallied more than 170 million blocked attack attempts in 2019. In the end, taking steps to protect your business or organization’s website before a breach costs less than trying to remedy the situation after a hack. Why Web Application Security Training Is Important? Web Application Security Testing evaluates if confidential data stays secure and users are able to only perform the tasks a website owner authorizes them to. Security testing ahead of an attack provides assurance that confidential data will remain confidential if a hacker targets your website. When a developer tests their own website, it helps expose any holes in the system that could be vulnerable. Some developers also run a “pen test,” short for penetration test, which is an authorized simulated cyberattack, which is performed to evaluate the system’s security. A pen test differs from a vulnerability test, which allows developers to identify, quantify, and prioritize their website’s vulnerabilities. The best security systems regularly test to find vulnerabilities and then evolve their protections to protect hackers from gaining access to unauthorized information. How Do You Learn Web Application Security? Developers who want to learn web application security can do so through online programs such as Cybrary’s online web security training course. Intermediate level developers will find Cybrary’s course easiest to complete. Cybrary’s Web Defense Fundamentals program offers students the opportunity to learn the essential skills necessary to deploy OWASP in the workforce. Cybrary’s program allows students to learn at their own pace by breaking down its content into smaller, more digestible modules that allow students to either learn the necessary skills quickly or if they need more time to have a natural stopping point in between learning essential skills. Cybrary’s web application security training spans 1 hour and six minutes, making it easy to complete in one day if the student desires. The longest module is the course assessment, which lasts 15 minutes. After successfully completing the Web Application Security course, Cybrary provides a web application security certification to students.

Cyber Defense Architecture course thumbnail
FREE

edX

Certificate

Cyber Defense Architecture

Cybersecurity
Network Security
DevSecOps

With the cost of cyber breaches skyrocketing, robust cyber defense architecture is more critical than ever. Businesses need talented professionals with the right cyber defense skills! This course provides a comprehensive guide to detecting, responding to, and preventing cyberattacks across multiple security domains. During the course, you’ll learn how to detect cyber threats using SIEM and XDR systems and utilizing advanced monitoring, analysis, and threat hunting techniques. You’ll gain insights into SOAR systems, automation, and orchestration, as well as breach notifications. You’ll build your understanding of IAM as the new perimeter of security and explore concepts like multifactor authentication (MFA) and privileged access management (PAM). Additionally, you’ll delve into network security, looking at firewalls, VPNs, and SASE, alongside application security practices such as secure coding, vulnerability testing, and DevSecOps. Plus, you’ll learn about data security through governance, compliance, detection, and response strategies. The course culminates in a hands-on final project where you'll design a secure network architecture and analyze real-world cybersecurity tools. Plus, a case study featuring IBM’s security solutions will deepen your understanding before you complete a final exam that will test your grasp of the fundamentals and key security concepts. If you’re looking to build the job-ready skills in cyber defense architecture employers need, ENROLL TODAY and get ready to add in-demand skills to your resume in just 5 weeks! Prerequisites: To enroll for this course you need to have a basic knowledge of networks, cloud computing, security concepts, and terminology.

Network Defense Strategies course thumbnail

Coursera

Certificate

Network Defense Strategies

Network Security
VPN
VLAN

In today’s interconnected world, secure network design is essential to organizational resilience. As networks expand across offices, plants, and data centers, cyber threats increasingly exploit vulnerabilities such as misconfigurations, weak segmentation, and unmonitored systems. This course equips learners with the skills to design, implement, and manage secure network infrastructures at every stage of their lifecycle. Through a balance of theory and hands-on labs, students will learn to apply principles like defense in depth, least privilege, segmentation, and zero trust. They will gain practical experience configuring VLANs, implementing firewalls and IDS/IPS, and deploying VPN technologies such as IPSec, SSL/TLS, and L2TP. Learners will also practice real-time traffic monitoring, log analysis, and SIEM integration to detect and respond to intrusions. Designed for aspiring network security professionals, system administrators, and IT managers, this course emphasizes scalable architectures, policy-driven operations, and continuous monitoring—preparing learners to protect modern enterprise networks against evolving threats.

Building an Enterprise DDoS Mitigation Strategy course thumbnail
FREE

YouTube

Building an Enterprise DDoS Mitigation Strategy

Network Security
Incident Response
Defense in-depth Strategy

Explore enterprise-level DDoS mitigation strategies in this comprehensive 46-minute conference talk from Louisville Infosec 2014. Delve into the fundamentals of DDoS attacks, including their goals and mechanics, while examining various mitigation techniques such as ISP mitigation, cloud scrubbing, and on-premise network edge protection. Learn about application layer defenses, monitoring practices, and the importance of multi-vendor approaches. Discover how to integrate incident response plans and demonstrate the business value of robust DDoS protection. Gain insights into creating an effective defense-in-depth strategy to safeguard your organization against evolving DDoS threats.

Gotham Chess Openings course thumbnail
FREE

YouTube

Gotham Chess Openings

Chess
Sports
Chess Openings

Learn chess openings with Gotham! In this course, you will learn about the Caro-Kann Defence, the Stonewall Defense and Attack, the Slav Defence, the Dutch Defence, the French Defence, the King’s Indian Defense, the London System, Crush, the Sicilian Defense, basic chess openings, the Catalan, the Evans and Nakhmanson Gambit, the English opening, the Queen’s Gambit, the Dyckhoff Variation, the Vienna Gambit, the Stafford Gambit, the Ortho Schnapp Gambit, the Vampire Gambit, the Monkey’s Bum, the Rozman French Defense, the International Ballistic Missile Gambit, the Godly Gambit, the Danish Gambit, the Fried Liver Attack, the Traxler Counter Attack, the Beef Eater, the Blackmar-Diemer Gambit, the Wing Gambit, the Trompowsky Attack, the Englund Gambit, and much more!

How to Become a Lawyer course thumbnail
FREE

FutureLearn

Certificate

How to Become a Lawyer

Law
Legal Education
Legal sector

Explore if a career in law is the right fit for you Legal careers can be both financially and emotionally rewarding, allowing you to build a long-lasting career around helping people in need. However, the legal sector has also been accused of a lack of diversity and representation. On this course, you’ll learn about the nature of the legal sector itself, and the different routes into law. You’ll identify the skills needed to succeed as a lawyer, and how you can upskill yourself accordingly. You’ll come away understanding the structures available to support your journey to becoming a lawyer – regardless of your educational background. This course is designed for anyone considering a career in law or who would like to find out more about studying law and working in the legal sector in England. No prior expertise in law or the law sector is required.

Self Defense Mindset - A Non Fighter's Guide to Self Defense course thumbnail

Udemy

Certificate

Self Defense Mindset - A Non Fighter's Guide to Self Defense

Self Defense
Self Improvement
Legal Procedures

A Beginner's Guide To Self-Defense - Discover how your Brain and Awareness are your best weapons, Learn to use them here What you'll learn: The basic principles of environmental awareness and strategic tactical personal space managementYou will learn peaceful negotiation and de-escalation tactics so as to avoid conflict entirely when possibleYou will learn how to be aware of and use your surroundings to your tactical advantage in a self-defense confrontation scenarioYou will learn the five most effective self-defense techniques that will allow you to cause maximum pain and compliance with minimal physical effortYou will learn how to moderate the force of your attack and only apply as much force as necessary to defend yourselfYou will learn the difference between a fight and a legitimate self-defense scenarioYou will learn to dispel the myths and misconceptions of self-defenseYou will learn the proper legal procedures to follow after a self-defense scenario has occurred, as well as your legal rights as a citizen LATEST: Course Updated Again for April 1st, 2023 Achieve a Better and Safer Quality Of Life With More Freedom and Confidence Even If You Have No Formal Training You Can Discover The Most Effective Ways Of Defending Yourself!You don't need to be Bruce Lee to defend yourself successfully The world has become an increasingly hostile place. It seems like every time you open a newspaper or turn on the news or surf the web you end up reading an article about someone being attacked. Walking to the car after a hard day's work or coming home from school or simply all out for an evening stroll on a warm summer's night, and then you think to yourself, would I know what to do if I was attacked; I wonder how I would respond? Well, you don't want to wait until you are in a real-world situation with no self-defense training under your belt to find out!! Self-Defense Mindset - A non Fighter's Guide to Self DefenseFeeling vulnerable and unprotected can cause undue stress because you may worry and feel nervous at the thought of going out alone. It doesn't matter if it's going to the store or out to a movie, if you avoid doing certain things or going certain places because of these feelings of helplessness, you limit your quality of life.That isn't right.All of us deserve to feel confident and safe in order to enjoy life - to travel further from home and to move about our daily lives with more freedom and awareness as well as less stress.Click the "Take This Course" button, on the top right because every hour you delay is costing you money...Scroll up and Enroll Now!All future updates to this course are free - you are "locked-in" at the current low price of $197 - but you will never pay more if you enroll today at the introductory low price.What you'll Learn in This Course:The basic principles of environmental awareness and strategic tactical personal space managementYou will learn peaceful negotiation and de-escalation tactics so as to avoid conflict entirely when possibleYou will learn how to be aware of and use your surroundings to your tactical advantage in a self-defense confrontation scenarioYou will learn the five most effective self-defense techniques that will allow you to cause maximum pain and compliance with minimal physical effortYou will learn how to moderate the force of your attack and only apply as much force as necessary to defend yourselfYou will learn the difference between a fight and a legitimate self-defense scenarioYou will learn to dispel the myths and misconceptions of self-defenseYou will learn the proper legal procedures to follow after a self-defense scenario has occurred, as well as your legal rights as a citizenAnd Much Much More.......What My Students Are Saying:"Effective techniques presented in an easy to understand manner I decided to take this self defense course because I feel more comfortable knowing that I can look after myself in most situations. The moves presented here are quite easy to understand and remember. Not only I learned to effective self defense techniques, but there is also some good advice on how to deal with dangerous situations in general. Although I hope I will never need to use what I learned from this course I feel much more at peace and confident now." LC"Very good course for men and women There's so much crime in the world today. What will you do the next time someone attempts to rob you? I thought about this same thing on several occasions. This course was helpful. It showed me how to try to avoid having to fight, but it also showed me ways to defend myself if I have no other choice. This course is highly recommended for men and women." HK" Positive and encouraging This course caters to both genders which is presented unbiased with factual data. Instead of making the course generalized for both, it separates into (2) separate merged lessons. Use of visual imagery as form of a demo followed by audio and text really enhance the learning environment. It touches on the main techniques that are minimal in complexity; increasing chances of a successful strike. I love the message that is stressed through the entire course. It does not promote violence, but stresses self-defense when all options have been exhausted. From hands on techniques to verbal communication for de-escalation are covered here. All is concise and well presented in an organized fashion. Extremely informative and provides direction to additional sources for those who would like more information. This course is presented in a serious but comfortable manner that does not dissuade others from continuing the course. I found this to be extremely helpful overall." CMAnd there's a 30 day absolutely no questions asked full money back guarantee - my personal promise of your happiness and satisfaction! You really cannot lose!Every minute you delay is actually jeopardizing your Ability to protect you and those you love the most.P.S. I should also point out that it would cost you hundreds or even thousands of dollars to get these strategies through personal Self Defense training. The current price was set so low to make it a total no-brainer for you. I am passionate about making these advanced productivity strategies affordable to absolutely everyone who can benefit from them. As with all my courses:the initial low price will increase shortly - the course is currently $200, but will next increase to $397you have unlimited lifetime access at no extra costs, everall future additional lectures, bonuses, etc in this course are always freethere's an unconditional, never any questions asked full 30 day money-back-in-full guaranteemy help is always available to you if you get stuck or have a question - my support is legendary in UdemyMartial arts and self defense are not the same!