Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ICS/SCADA network security monitoring strategies for challenging industrial environments, focusing on real-world applications, threat models, and effective monitoring techniques.
Explore Intrusion Detection Honeypots as a cost-effective security measure. Learn to deploy honey services in your network and integrate alerts into Security Onion's monitoring pipeline.
Explore how Security Onion integrates with automation tools for enhanced incident response, enabling faster threat detection and improved security operations efficiency.
Explore Security Onion 2.0's so-import-pcap feature for importing and analyzing network packet captures, enhancing threat detection and incident response capabilities for blue teamers.
Explore techniques for detecting traffic anomalies using SSL certificates, including metadata analysis, Python scripting, and visualization tools for enhanced network security monitoring.
Learn to build an effective security playbook using Security Onion, covering integration, shared resources, detections, templates, and Elastic Search for enhanced threat response.
Learn to build a comprehensive detection lab using SecurityOnion, covering network topology, firewall configuration, data sources, and practical scenarios for enhancing cybersecurity skills.
Explore analyst thinking modes, creativity, and intelligence in cybersecurity. Learn about divergent and convergent thinking, problem-solving techniques, and research methodologies for effective security analysis.
Explore advanced techniques for leveraging Freq and Domain_Stats tools in cybersecurity analysis, enhancing threat detection and network monitoring capabilities.
Explore cybersecurity team roles, network layouts, and threat detection scenarios using Security Onion. Learn about FOSS tools, packet analysis, and data source integration for effective security operations.
Learn data analysis techniques for cybersecurity using open-source tools like Security Onion and Python. Explore PANDAS, ElasticSearch, frequency analysis, and time series analysis for effective threat hunting.
Explore integrating Osquery into Security Onion for enhanced endpoint visibility and threat detection. Learn about Chrome extensions, query types, and firewall control in this informative conference talk.
Learn effective pivoting techniques to enhance threat detection and investigation skills, improving your ability to identify and catch malicious actors in cybersecurity.
Explore Snort's evolution and future in network security with Joel Esler. Gain insights into its development, key features, and upcoming innovations for effective threat detection and response.
Explore machine learning techniques for analyzing Bro logs, focusing on supervised and unsupervised methods to enhance cybersecurity threat detection and analysis.
Get personalized course recommendations, track subjects and courses with reminders, and more.