Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the latest updates and enhancements to MISP, the open-source threat intelligence platform, presented by Andras Iklody at Hack.lu 2023.
Explore challenges in communicating uncertainties within the Cyber Threat Intelligence industry, examining industry practices and potential improvements for more effective risk assessment.
Discover Kunai, an innovative threat hunting tool for Linux systems. Learn its features, capabilities, and how it enhances cybersecurity through advanced detection techniques.
Explore open-source tools for building an Information Sharing and Analysis Center (ISAC), fostering community collaboration and enhancing cybersecurity threat intelligence sharing.
Explore the evolution and future of Cyber Threat Intelligence (CTI) in this thought-provoking talk, examining its challenges, innovations, and potential impact on cybersecurity strategies.
Explore the implications of Software Bill of Materials (SBOMs) in cybersecurity, examining their potential benefits and challenges for software supply chain management.
Explore innovative data visualization techniques for enhancing information security analysis and communication, presented by expert Ange Albertini at Hack.lu 2023.
Explore techniques for identifying VPNs and proxies through analysis of their attack patterns, enhancing network security and threat detection capabilities.
Explore Yeti's latest advancements in threat intelligence, including new features and capabilities for enhanced cybersecurity analysis and investigation.
Discover Pyrrha, a tool for effortlessly exploring system binaries, enhancing your understanding of executable files and improving reverse engineering capabilities.
Enhance your Cyber Threat Intelligence skills with advanced IOC validation techniques, improving efficiency and accuracy in threat analysis and response.
Explore modern Indicators of Compromise (IOCs) matching techniques using Suricata, enhancing network security and threat detection capabilities.
Explore JTAN, an innovative data sharing network, with experts Paweł Pawliński and Alexandre Dulaunoy. Learn about its features, applications, and potential impact on information exchange.
Explore the ongoing cyber conflict between Ukraine and Russia, analyzing tactics, impacts, and implications for global cybersecurity in this insightful conference presentation.
Explore the pervasive influence of Lazarus and related threat actors in cybersecurity, uncovering their tactics, techniques, and global impact on digital landscapes.
Get personalized course recommendations, track subjects and courses with reminders, and more.