Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Leverage AI and machine learning to enhance malware detection and classification, analyzing large datasets and creating a new ensemble classification facility for improved cybersecurity.
Discover how to automate incident response using open-source tools, combining digital forensics with DevOps for faster, more efficient security incident handling at scale.
Explore GenAI's transformative impact on cybersecurity, examining challenges, opportunities, and strategies for organizations to evolve defensively and offensively in this new landscape.
Explore fast-file processing techniques for efficient digital forensics and incident response, enhancing investigative capabilities without complications.
Explore real-world strategies for combating multiple persistent threat actors simultaneously, uncovering their evasion tactics and adapting incident response techniques in complex cybersecurity scenarios.
Learn best practices for communicating about security incidents internally and externally. Explore case studies, regulatory impacts, and strategies to effectively inform stakeholders during crises.
Explore additional Microsoft cloud datasets beyond standard logging to enhance visibility, detect suspicious activity, and defend against tools like GraphRunner exploiting Graph API vulnerabilities.
Explore Ghidra plugin development for efficient reverse engineering, using Game Boy games as an engaging example to showcase automation possibilities and enhance RE skills.
Decipher GCP audit logs to enhance cloud security monitoring. Gain insights into authentication details, impersonations, and principal identities. Learn to identify workload identities and understand service agents' significance.
Explore Android's Find My Device system, including artifact detection for rogue trackers and account-associated trackers. Learn about privacy concerns and Google's data handling in this network.
Explore drone forensics, data extraction techniques, and real-world case studies. Learn how drones impact investigations and uncover insights from "Operation White Lightning" in this comprehensive presentation.
Explore Strelka, an open-source tool for scalable file analysis, enhancing threat detection capabilities and streamlining cybersecurity workflows in large-scale enterprise environments.
Arm yourself with techniques to analyze VPN-related intrusions, understand threat actor tactics, and identify IOCs. Gain actionable insights for improved incident response and VPN defense.
Explore challenges, techniques, and free tools for effective macOS imaging and collection verification in digital forensics.
Uncover hidden forensic artifacts from idle iOS devices using system logs, revealing crucial data for investigations beyond traditional imaging methods.
Get personalized course recommendations, track subjects and courses with reminders, and more.