Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore AI's role in creativity and investment research with expert talks on leveraging LLMs for innovative applications and financial analysis.
Explore the xLeapp family of digital forensics tools with FBI and academic experts, covering new developments, project extensions, and practical applications in mobile app analysis.
Decrypt TLS traffic on-the-fly with friTap, an open-source framework for intercepting encryption keys. Learn about its applications in network forensics and protocol research across major operating systems.
Explore Log Parser as a forensic tool for incident response, combining MS and open-source tools to collect and analyze system data, logs, and registry information efficiently.
Explore Linux desktop forensics in GNOME and KDE environments, comparing user activity artifacts and investigation techniques for digital forensics professionals.
Explore Chromebook forensics challenges, acquisition methods, cloud data analysis, and comparative data recovery techniques in this updated talk on digital investigation advancements since 2018.
Explore Velociraptor's powerful VQL for efficient DFIR hunting at scale. Learn to perform on-endpoint analysis, create custom detections, and implement real-time monitoring rules for rapid incident response.
Explore cloud security threats, including the Golden SAML attack, and learn detection strategies using open-source tools to protect against unauthorized access in cloud environments.
Explore memory forensics techniques for digital investigations, covering attack methodologies and analysis steps. Learn to uncover hidden evidence in volatile memory samples for more comprehensive case insights.
Discover advanced techniques for processing Windows event logs using Rust, including fast large-scale searching, recovering records from empty pages, and leveraging open-source tools for forensic analysis.
Modular framework for remote threat hunting and incident response on Windows systems, mapping capabilities to MITRE ATT&CK Framework. Improves on Kansa with expanded functionality and community collaboration.
Explore open-source tools for forensically acquiring online evidence, including websites, social media, and cloud services. Learn techniques for preserving digital content with verifiable processes and blockchain timestamps.
Demonstration of an open-source automation tool for Security Incident recorders, designed to track and document incidents efficiently for forensic and legal purposes.
Comprehensive update on Autopsy digital forensics tool, covering new features like Web Domain interfaces, scoring, and Solr 8 upgrade. Explores improvements in UI, artifact pipelines, and integration with other forensic tools.
Explore Active Directory security, lateral movement, and privilege escalation techniques. Learn forensic approaches for investigating AD incidents using open-source tools, with insights for both red and blue teams.
Get personalized course recommendations, track subjects and courses with reminders, and more.