Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques for evading Microsoft ATA in Active Directory environments, including threat detection bypasses, attack chain modifications, and strategies for maintaining domain dominance.
Explore open-source security orchestration using Adaptive Network Protocol (ANP) for efficient threat response, automated network defense, and improved visibility across multiple systems and clouds.
Explore virtual terminals, POS security, and payment fraud techniques. Learn about transaction vulnerabilities, card exploitation, and merchant-side risks in electronic payment systems.
Explore techniques for extracting sensitive data from browser memory dumps, including passwords and session tokens, with insights on potential solutions and vendor responses.
Explore security through design principles, examining real-world examples and innovative approaches to create safer digital environments and user interactions.
Explore the evolution and challenges of cybersecurity defense through historical analogies, myths, and modern-day realities in this thought-provoking keynote address.
Explore anti-forensics techniques for Windows, Linux, and Android, covering memory analysis, encryption, and hardware implants. Learn to protect digital evidence and understand forensic challenges.
Explore physical security vulnerabilities in doors and padlocks, covering various components, attack methods, and protective measures for enhanced security awareness.
Strategies for building and operating an effective internal adversarial simulation team, covering threat analysis, offensive techniques, and defensive metrics to enhance cybersecurity posture.
Explore threat intelligence creation using Evernote, covering data-driven feeds, task management, and open-source intelligence gathering for effective organizational security strategies.
Exploring the future of cybersecurity, balancing technology and talent, and addressing challenges in the industry through automation, red teaming, and strategic focus.
Unveiling hidden WiFi communication techniques, exploring covert methods, and analyzing security implications of invisible wireless networks.
Explore mobile network vulnerabilities, SIM card access techniques, and baseband firmware analysis. Learn about "wormholes" in smartphones and their potential for identity theft and unauthorized authentication.
Optimizing threat intelligence with MISP: Learn to curate, contextualize, and automate TI feeds for actionable insights, reducing false positives and enhancing SOC, IR, and malware analysis collaboration.
Explore the Cyber Threat Intelligence Analyst role, its competencies, and how it intersects with other cybersecurity disciplines to enhance collaboration and organizational security posture.
Get personalized course recommendations, track subjects and courses with reminders, and more.