Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover essential threat hunting fundamentals, emphasizing human analysis, quality data, and understanding organizational blind spots for proactive cybersecurity defense.
Discover advanced strategies to detect and defend against sophisticated phishing attacks, including AI-driven threats and spear phishing techniques using MITRE ATT&CK framework.
Dive into October's top cyber threats including Tampered Chef and CleanUpLoader, exploring their deceptive behaviors and mitigation strategies in this cybersecurity intelligence briefing.
Explore how cybercriminals exploit AI command-line tools, Windows vulnerabilities, and supply chain weaknesses while learning detection strategies for evolving threats.
Uncover how STORM-2603 exploits legitimate DFIR tools like Velociraptor for ransomware attacks and learn detection strategies to differentiate malicious from legitimate use.
Master threat emulation techniques using Atomic Red Team to validate detection capabilities against ransomware threats, incorporating cyber threat intelligence for enhanced security response and validation.
Master behavioral detection strategies and prevention techniques to effectively identify malicious activities, reduce false positives, and strengthen security defenses using open-source tools.
Discover comprehensive strategies for detecting and combating information-stealing malware, from identification and detection methods to practical mitigation techniques for both Windows and macOS systems.
Dive into advanced WMI threat detection techniques and investigation methods using Microsoft Defender for Endpoint to identify and counter malicious lateral movement attempts.
Discover how adversaries exploit Windows Management Instrumentation (WMI) for persistence, with expert insights on detection strategies and real-world examples from MITRE ATT&CK® and Microsoft specialists.
Discover how adversaries exploit installer packages across operating systems and learn effective investigation techniques and defensive strategies against malicious installers with MITRE ATT&CK expertise.
Master essential incident response strategies to enhance organizational security through planning, detection, communication, and continuous drilling programs for rapid threat mitigation.
Discover effective tactics to protect AWS environments from threats, enhance cloud security monitoring, and implement robust detection and response strategies for modern cloud infrastructure.
Discover how to effectively integrate GenAI into security operations, focusing on practical implementation strategies, optimal use cases, and real-world SOC applications.
Discover how to modernize your Security Operations Center with effective strategies, from leveraging new technologies to optimizing insourcing and outsourcing decisions for enhanced threat response.
Get personalized course recommendations, track subjects and courses with reminders, and more.