Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the creation of malicious phone charging stations, understanding potential security risks and vulnerabilities in public charging infrastructure.
Explore the security vulnerabilities and potential threats in embedded SIM technology, uncovering risks and implications for mobile communications and IoT devices.
Explore techniques to bypass VPN Always-On security measures, uncovering potential vulnerabilities and network protection strategies.
Explore ongoing EvilEye campaigns targeting CCP adversaries, analyzing tactics, targets, and implications for cybersecurity professionals and policymakers.
Explore the impact of digital technologies on modern warfare and its implications for global security in this insightful presentation by Mauro Vignati.
Explore community orchestration techniques using Cerebrate, a powerful tool for managing and coordinating collaborative efforts in cybersecurity and threat intelligence.
Explore MISP-STIX integration for enhanced threat intelligence sharing, focusing on data conversion and interoperability between MISP and STIX formats.
Learn to enhance Cyber Threat Intelligence operations using Jupyter Notebooks and MISP. Explore practical techniques for data analysis, visualization, and threat information sharing.
Explore a context-centric threat intelligence platform for enhanced cybersecurity analysis and decision-making in this insightful presentation by Antoine Cailliau.
Explore modern webshell techniques, detection methods, and defensive strategies in this comprehensive overview of the evolving threat landscape.
Explore strategies for implementing MISP on air-gapped networks to address operational challenges in secure environments.
Explore the crucial role of communities in enhancing cyber threat intelligence, uncovering their potential to revolutionize information sharing and collaborative defense strategies.
Discover techniques for identifying and exposing vulnerabilities in internet services at scale, enhancing cybersecurity knowledge and skills for large-scale systems.
Explore MISP to Power BI integration for enhanced threat intelligence visualization and analysis, empowering cybersecurity teams with actionable insights.
Explore techniques for generating actionable threat intelligence through effective curation, enhancing cybersecurity strategies and decision-making processes.
Get personalized course recommendations, track subjects and courses with reminders, and more.