Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques for exploiting Bash on Windows, including remote shells, password extraction, and AppLocker bypasses. Learn about security implications and forensic considerations.
Explore MISP's open formats, standardization efforts, and governance in threat intelligence sharing, emphasizing complexity management and interoperability.
Explore community orchestration techniques using Cerebrate, a powerful tool for managing and coordinating collaborative efforts in cybersecurity and threat intelligence.
Explore MISP-STIX integration for enhanced threat intelligence sharing, focusing on data conversion and interoperability between MISP and STIX formats.
Learn to enhance Cyber Threat Intelligence operations using Jupyter Notebooks and MISP. Explore practical techniques for data analysis, visualization, and threat information sharing.
Explore a context-centric threat intelligence platform for enhanced cybersecurity analysis and decision-making in this insightful presentation by Antoine Cailliau.
Explore strategies for implementing MISP on air-gapped networks to address operational challenges in secure environments.
Learn strategies to avoid common pitfalls in Cyber Threat Intelligence (CTI) implementation and maximize its effectiveness for your organization's security posture.
Explore the crucial role of communities in enhancing cyber threat intelligence, uncovering their potential to revolutionize information sharing and collaborative defense strategies.
Discover techniques for identifying and exposing vulnerabilities in internet services at scale, enhancing cybersecurity knowledge and skills for large-scale systems.
Explore MISP to Power BI integration for enhanced threat intelligence visualization and analysis, empowering cybersecurity teams with actionable insights.
Explore techniques for generating actionable threat intelligence through effective curation, enhancing cybersecurity strategies and decision-making processes.
Explore the latest developments and future roadmap of MISP, the open-source threat intelligence platform, with insights from a key developer.
Uncover the journey of an elusive backdoor malware as it traverses from Europe to China, exploring its origins, capabilities, and potential impact on cybersecurity.
Enhance CTI pipelines with improved MISP workflow techniques. Learn efficient strategies for threat intelligence management and streamline your cybersecurity processes.
Get personalized course recommendations, track subjects and courses with reminders, and more.