Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore key log sources for Okta, GitHub, and Salesforce in cloud-based incident response. Learn to interpret SaaS logs, avoid common pitfalls, and improve detection strategies for effective security management.
Explore the appeal of Digital Forensics and Incident Response for newcomers, addressing challenges and strategies to attract and retain talent in this evolving field of cybersecurity.
Explore advanced cloud-focused attack techniques and defense strategies against persistent threat actors like Scattered Spider. Learn about their methodical approach, TTPs, and how to protect your organization's assets.
Explore APT attacks on Taiwan's financial sector, focusing on supply chain vulnerabilities. Learn about MDM platform exploitation, JIRA abuse, and malware-free attacks. Gain insights into island-hopping techniques and comprehensive threat mapping.
Explore how Scattered Spider has revolutionized ransomware tactics, shifting from traditional TTPs to cutting-edge infiltration techniques across multiple victim environments.
Discover essential ransomware incident response strategies, containment processes, and data preservation techniques through real-world case studies and expert insights.
Explore a systematic framework for analyzing and communicating cyber threat intelligence during geopolitical conflicts, using Russia-Ukraine war insights to prepare for future global tensions.
Discover how startup principles like growth mindset, ownership, and customer obsession can transform your Cyber Threat Intelligence practice, drawing from real-world experiences across various organizational contexts.
Explore threat actor collaboration through a case study of "Red Ishtar", examining shared tools, infrastructure, and attribution challenges while gaining practical frameworks for comparative threat analysis.
Discover practical strategies for implementing CyberHUMINT in threat intelligence operations, from building covert online profiles to engaging with threat actors and managing compromised operations.
Explore the intriguing afterlife of exposed malware command and control domains, their continued value for threat actors and defenders, and the surprising insights from monitoring these supposedly burned assets.
Delve into the evolving psychology and business tactics of modern ransomware syndicates, examining their sophisticated operations, target selection strategies, and effective countermeasures for enhanced cybersecurity defense.
Explore social media cyber threats and fraud prevention strategies in Indonesia, focusing on customer impersonation, platform exploitation, and effective CTI implementation for risk management.
Dive into advanced threat intelligence methodologies through a real-world case study of a triple nation-state APT attack, covering clustering techniques, attribution frameworks, and intelligence-driven hunting approaches.
Discover STRAT methodology for enhancing cyber defense resilience through systems thinking, enabling deeper threat analysis and improved defensive strategies while building adaptable security postures.
Get personalized course recommendations, track subjects and courses with reminders, and more.