Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the Central Intelligence Vetting Platform presented at MISP Summit 2018. Learn about innovative approaches to intelligence analysis and information sharing in cybersecurity.
Explore techniques for creating high-quality IoCs from open-source intelligence and enhancing threat data enrichment in MISP for improved cybersecurity analysis and information sharing.
Explore quantitative methods for comparing Advanced Persistent Threats using MISP, enhancing threat intelligence analysis and cybersecurity strategies.
Explore advanced clustering techniques for threat intelligence data analysis and visualization in MISP, enhancing cybersecurity insights and decision-making processes.
Explore a method for capturing and qualifying Indicators of Compromise (IOCs) from Twitter and integrating them into MISP for enhanced threat intelligence.
Explore the integration of MISP and McAfee technologies to enhance threat intelligence sharing and create a robust security ecosystem for improved cybersecurity.
Explore unexpected security vulnerabilities discovered in everyday scenarios, from web automation to airport security. Learn how seemingly innocuous systems can be exploited for data theft or financial gain.
Explore the creation of a functional microcomputer using TTL chips, without a microprocessor. Learn about hardware design, software stack, and unique capabilities of the Gigatron project.
Practical demonstration of modern hacking techniques and defense strategies through a simulated bank robbery, offering insights into targeted attacks and organizational preparedness.
Explore SMT solvers for deobfuscating binary code in IT security. Learn practical applications, theoretical limitations, and solutions for enhancing malware analysis and vulnerability identification.
Explore symbolic execution for vulnerability discovery and reverse engineering. Learn KLEE symbolic virtual machine basics to solve complex challenges in software security.
Discover how to apply bug bounty techniques within your organization for enhanced security. Learn to extract and utilize information from various sources to identify vulnerabilities proactively.
Explore security vulnerabilities in VoLTE and VoWiFi, including sniffing attacks, key extraction, and SIP header injections. Learn about potential risks and mitigation strategies for modern voice communication technologies.
Explore automation attacks plaguing various industries, their detection methodologies, and real-world examples of distributed infrastructure used by attackers to launch and monetize these widely distributed, difficult-to-detect threats.
Exploring challenges in threat intelligence platforms and advocating for event-based approaches. Discusses experiences with various systems and settling on MISP for effective correlation and analysis of cyber threats.
Get personalized course recommendations, track subjects and courses with reminders, and more.