Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced ELSA features for security analysis, including Elasticsearch integration, improved syslog-ng, containerization, and new visualization tools like Ankey and geo mapping.
Explore data-driven perspectives on digital forensics and incident response, focusing on cognitive challenges, investigation processes, and analytical strategies for security professionals.
Leveraging Security Onion to identify command and control channels, focusing on various techniques like Echo Request, SSH Tunnel, ICMP, and DNS-based methods for detecting malicious network activities.
Explore essential analyst tools in Security Onion 2.4.70, enhancing your network security monitoring capabilities and threat detection skills.
Learn to optimize Security Onion's detection capabilities by fine-tuning rules through the Detections interface, enhancing your network security monitoring and threat detection effectiveness.
Explore threat hunting techniques in Security Onion 2.4.70, enhancing your cybersecurity skills and network defense capabilities.
Explore detection engineering in Security Onion 2.4.70, covering key techniques and best practices for enhancing network security and threat detection capabilities.
Learn efficient alert triage and case creation techniques for Security Onion 2.4.70, enhancing your cybersecurity incident response capabilities and streamlining threat management processes.
Comprehensive guide to finalizing Security Onion 2.4.70 setup, covering advanced configuration steps and best practices for optimal network security monitoring.
Explore Security Onion 2.4.70's features, deployment options, and support in this concise introduction. Learn about training resources and enterprise solutions for enhanced network security monitoring.
Explore integration of Security Onion and Sublime Platform for enhanced email security. Learn to triage alerts, investigate suspicious emails, and correlate data for comprehensive defense against email-based attacks.
Explore proactive risk reduction through monitoring organizational changes in subdomains, certificates, IP space, and cloud resources using Security Onion's new proof of concept node.
Discover PEAK, a new threat hunting framework enabling diverse techniques like exploratory data analysis and machine learning to uncover elusive threats and elevate your security program.
Diagnose and address one-sided traffic issues in network security. Learn to identify incomplete data collection and its impact on threat detection and hunting efforts.
Cybersecurity expert Dave Kennedy delivers insights on industry trends, national security, and the future of digital protection in this engaging keynote address.
Get personalized course recommendations, track subjects and courses with reminders, and more.