Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover advanced techniques for data breach research and legal frameworks while exploring DorXNG, a next-gen OSINT tool for ethical security testing and red team operations.
Explore the anatomy of data leaks through real-world cases from the past year, examining breach patterns, criminal marketplace dynamics, and emerging trends in cybersecurity threats and vulnerabilities.
Discover advanced OSINT techniques for big data analysis, including practical applications of Google BigQuery, CommonCrawl, and Rapid7 Open-Data for enhanced intelligence gathering and security research.
Discover how to build a scalable, cost-effective reconnaissance framework using AWS serverless architecture for cybersecurity and bug bounty hunting, featuring automated workflows and efficient resource management.
Discover essential strategies for protecting your digital privacy and minimizing your online footprint through effective OSINT defense techniques and data control methods.
Discover the art of Open Source Intelligence through a Dr. Seuss-inspired exploration of OSINT tools, techniques, and ethical considerations for gathering and analyzing publicly available information.
Discover how to monitor temporary email services using a Python tool to uncover valuable information, from account credentials to bitcoin wallets, while learning about security implications and red team activities.
Explore how Generative AI and Large Language Models impact Open Source Intelligence (OSINT), examining challenges, risks, and strategies for maintaining data integrity in intelligence gathering.
Discover innovative techniques for uncovering coordinated influence operations through media metadata analysis, illustrated with a real-world case study of pro-PRC operator Dragonbridge.
Discover how to implement Easy EASM, a zero-cost tool for automated external asset discovery and monitoring, featuring daily Slack/Discord alerts and comprehensive asset tracking capabilities.
Discover how to gather intelligence on Azure AD environments using OSINT tools, including domain enumeration, authentication methods, and user information for security assessment purposes.
Uncover the journey of identifying a North Korean state-sponsored threat actor through malware analysis, OSINT investigation, and interviews with intelligence agencies and security forces.
Discover how Ensemble revolutionizes bug bounty hunting by bypassing GeoDNS limitations, enabling comprehensive scanning across multiple geographic regions through a distributed cluster of nodes and user-friendly web interface.
Discover innovative strategies for personal security by creating deliberate digital noise and misinformation to protect yourself from stalkers while maintaining an active online presence.
Discover how the Open Asset Model integration in OWASP Amass v4.0 revolutionizes attack surface mapping, enabling comprehensive digital and physical asset management while revealing hidden security vulnerabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.