Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore key log sources for Okta, GitHub, and Salesforce in cloud-based incident response. Learn to interpret SaaS logs, avoid common pitfalls, and improve detection strategies for effective security management.
Explore the appeal of Digital Forensics and Incident Response for newcomers, addressing challenges and strategies to attract and retain talent in this evolving field of cybersecurity.
Explore advanced cloud-focused attack techniques and defense strategies against persistent threat actors like Scattered Spider. Learn about their methodical approach, TTPs, and how to protect your organization's assets.
Explore APT attacks on Taiwan's financial sector, focusing on supply chain vulnerabilities. Learn about MDM platform exploitation, JIRA abuse, and malware-free attacks. Gain insights into island-hopping techniques and comprehensive threat mapping.
Discover effective communication strategies for ransomware incidents, from managing internal team coordination to public responses and consumer notifications during and after the crisis.
Explore a systematic framework for analyzing and communicating cyber threat intelligence during geopolitical conflicts, using Russia-Ukraine war insights to prepare for future global tensions.
Discover how startup principles like growth mindset, ownership, and customer obsession can transform your Cyber Threat Intelligence practice, drawing from real-world experiences across various organizational contexts.
Explore threat actor collaboration through a case study of "Red Ishtar", examining shared tools, infrastructure, and attribution challenges while gaining practical frameworks for comparative threat analysis.
Discover practical strategies for implementing CyberHUMINT in threat intelligence operations, from building covert online profiles to engaging with threat actors and managing compromised operations.
Explore the intriguing afterlife of exposed malware command and control domains, their continued value for threat actors and defenders, and the surprising insights from monitoring these supposedly burned assets.
Delve into the evolving psychology and business tactics of modern ransomware syndicates, examining their sophisticated operations, target selection strategies, and effective countermeasures for enhanced cybersecurity defense.
Explore social media cyber threats and fraud prevention strategies in Indonesia, focusing on customer impersonation, platform exploitation, and effective CTI implementation for risk management.
Dive into advanced threat intelligence methodologies through a real-world case study of a triple nation-state APT attack, covering clustering techniques, attribution frameworks, and intelligence-driven hunting approaches.
Discover STRAT methodology for enhancing cyber defense resilience through systems thinking, enabling deeper threat analysis and improved defensive strategies while building adaptable security postures.
Explore a real-world case study demonstrating how Cyber Threat Intelligence identifies detection gaps and transforms into actionable security strategies for enhanced organizational protection.
Get personalized course recommendations, track subjects and courses with reminders, and more.