Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring the blurred lines between state-sponsored actors, APT groups, and crimeware gangs, challenging traditional classifications and discussing the emergence of second-tier APT categories.
Análisis de vulnerabilidades en software educativo durante la pandemia, explorando ataques potenciales y sus implicaciones para la seguridad de dispositivos escolares y domésticos.
Detailed analysis of KashmirBlack botnet's infrastructure, operation, and evolution. Explores its infection methods, global impact, and adaptability. Highlights the importance of CMS security and cyber hygiene in the digital age.
Comprehensive guide to creating efficient detection rules, from initial hunting ideas to actionable alerts for security analysts, using a real-world example of an Outlook persistence technique.
Explore data science methods for advanced threat detection in SOCs, combining unsupervised and supervised learning to reduce false positives and streamline anomaly triage using ML and interactive visualizations.
Comprehensive analysis of dRuby's security vulnerabilities, exploring its API, internals, and wire protocol. Demonstrates novel exploitation techniques and discusses efforts to harden dRuby against identified issues.
Learn techniques to enhance security in Electron apps, focusing on threat modeling, separation of concerns, and best practices. Discover insights from building a secure password manager using this framework.
Learn essential best practices for securing Kubernetes clusters, covering key vulnerabilities, attack vectors, and protective measures to safeguard containerized applications.
Learn to build custom security tools using Joern for static code analysis, enhancing your ability to detect vulnerabilities and improve software security.
Hands-on workshop exploring automated contact tracing using ESP Vroom32 microcontroller, focusing on practical implementation and experimentation with the NorthSec 2021 badge.
Explore the fundamentals of fuzzing, a powerful software testing technique, in this comprehensive workshop led by expert Dhiraj Mishra.
Hands-on guide for implementing Atomic Red Team, covering setup, execution, and best practices for effective cybersecurity testing and threat emulation.
Learn efficient techniques for analyzing Android malware, focusing on smart and time-saving approaches to reverse engineering and threat assessment.
Discover a fast-paced, backlog-based approach to threat modeling in DevSecOps environments without slowing development or requiring additional tools. Learn to implement effective security practices efficiently.
Get personalized course recommendations, track subjects and courses with reminders, and more.