Popular Free Courses

Peking University
Skills you'll gain: Memory Management, Data Structures, Algorithms, Performance Tuning, Information Management, Theoretical Computer Science, File Management

Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Threat Management, Cybersecurity, Endpoint Detection and Response, Cyber Attacks, Cyber Threat Intelligence, Digital Forensics, Intrusion Detection and Prevention, Threat Detection, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Exploitation techniques, Malware Protection, Memory Management, Analysis

Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cybersecurity, Network Security, Digital Forensics, Network Monitoring, Data Security, Network Analysis, Exploitation techniques, Malware Protection, Memory Management

Skills you'll gain: Microarchitecture, Memory Management, System Programming, Embedded Software, Hardware Architecture, System Software, Embedded Systems, Computer Architecture, Programming Principles, System Configuration, Debugging, Application Development

Dartmouth College
Skills you'll gain: Command-Line Interface, Linux Commands, Linux, Embedded Systems, Linux Servers, Computer Engineering, File Systems, Unix, Operating Systems, C (Programming Language), File Management, Memory Management, Computer Programming Tools, Computer Programming, Open Source Technology, OS Process Management

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Security Controls, Malware Protection, Security Engineering, Network Security, IT Security Architecture, Threat Detection, Firewall, Digital Forensics, Anomaly Detection, Code Review, Network Routing, Linux Commands, Proxy Servers, Linux, Internet Of Things

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Test Tools, Web Scraping

L&T EduTech
Skills you'll gain: Embedded Software, Peripheral Devices, Integrated Development Environments, Embedded Systems, Computer Programming Tools, Development Environment, Microarchitecture, Automation, Real Time Data, Hardware Architecture, Computer Architecture, Prototyping, Memory Management

Skills you'll gain: Embedded Systems, Embedded Software, C (Programming Language), C and C++, Programming Principles, Memory Management, Hardware Architecture, Computational Logic, Computer Architecture, Computer Programming, Peripheral Devices, Data Storage

28DIGITAL
Skills you'll gain: File I/O, Data Structures, Theoretical Computer Science, Algorithms, Memory Management, Graph Theory, Data Access, Performance Tuning

Nanjing University
Skills you'll gain: Operating Systems, File Management, Computer Systems, File Systems, OS Process Management, System Software, Software Architecture, Software Systems, Memory Management, Software Design, System Design and Implementation, File I/O, Computer Hardware, Peripheral Devices, Algorithms, Human Computer Interaction

Skills you'll gain: Hardware Troubleshooting, Computer Hardware, Hardware Architecture, Microarchitecture, Computer Architecture, IT Infrastructure, Data Storage Technologies, System Configuration, Data Storage, Memory Management
In summary, here are 10 of our most popular free courses
- 高级数据结构与算法: Peking University
- Cyber Incident Response: Infosec
- Technical Deep Dive with Incident Response Tools: Infosec
- Armv8-M Architecture Fundamentals: Arm
- Linux Basics: The Command Line Interface - 6: Dartmouth College
- DDoS Attacks and Defenses: University of Colorado System
- Web Application Security Testing with OWASP ZAP: Coursera
- Microcontroller and Industrial Applications: L&T EduTech
- ARM Cortex (STM32) Fundamentals: Building Embedded Systems: EDUCBA
- I/O-efficient algorithms: 28DIGITAL