Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore autonomous hacking with Mechanical Phish, a system for automatic bug detection, exploit creation, and binary patching. Learn about its design, challenges, and implementation in the DARPA Cyber Grand Challenge.
Unveiling the sophisticated attack chain of Russian-speaking cybercriminals, detailing their infrastructure, techniques, and resources accumulated since 2007, including billions of compromised emails and millions of infected servers.
Unveiling vulnerabilities in HID Global Soft Token's Android app, exploring cryptographic weaknesses that could allow attackers to clone configurations and potentially discover user PINs through brute force.
Exploring the world of 'booter' services: their users, providers, and impact on online gaming. Insights into cybercrime pathways and the motivations behind denial of service attacks.
Explore handling security requirements throughout software development, covering scalability, use cases, and practical demonstrations with insights on data protection and integration.
Explore Android security techniques for safeguarding secrets, from authentication to key management. Learn practical approaches to enhance app security and protect sensitive data.
Learn strategies for scaling MISP using cloud technologies to enhance threat intelligence sharing and improve cybersecurity operations in large-scale environments.
Explore advancements in atomic threat coverage, including new architecture and mitigation strategies. Gain insights into ongoing work and discuss innovative ideas in cybersecurity.
Explore the synergy between EclecticIQ Platform and MISP for enhanced threat intelligence sharing, automated analysis, and streamlined incident response workflows.
Explore efficient data storage and retrieval techniques for large-scale threat intelligence using Sighting, focusing on performance optimization and integration strategies.
Explore techniques for exploiting Bash on Windows, including remote shells, password extraction, and AppLocker bypasses. Learn about security implications and forensic considerations.
Explore MISP's open formats, standardization efforts, and governance in threat intelligence sharing, emphasizing complexity management and interoperability.
Explore the importance of strategic threat intelligence, covering key concepts like CTI, Pyramid of Pain, and influence operations in cybersecurity and market expansion.
Explore ethical approaches to internet-wide scanning, including best practices, vulnerability assessment, and measuring risk exposure in the digital landscape.
Explore techniques for generating MITRE ATT&CK DNA profiles of threat actor groups, analyzing similarities, and addressing challenges in attribution and emulation.
Get personalized course recommendations, track subjects and courses with reminders, and more.