Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Security Onion 2.0's so-import-pcap feature for importing and analyzing network packet captures, enhancing threat detection and incident response capabilities for blue teamers.
Explore techniques for detecting traffic anomalies using SSL certificates, including metadata analysis, Python scripting, and visualization tools for enhanced network security monitoring.
Learn to build an effective security playbook using Security Onion, covering integration, shared resources, detections, templates, and Elastic Search for enhanced threat response.
Learn to build a comprehensive detection lab using SecurityOnion, covering network topology, firewall configuration, data sources, and practical scenarios for enhancing cybersecurity skills.
Explore analyst thinking modes, creativity, and intelligence in cybersecurity. Learn about divergent and convergent thinking, problem-solving techniques, and research methodologies for effective security analysis.
Explore advanced techniques for leveraging Freq and Domain_Stats tools in cybersecurity analysis, enhancing threat detection and network monitoring capabilities.
Explore cybersecurity team roles, network layouts, and threat detection scenarios using Security Onion. Learn about FOSS tools, packet analysis, and data source integration for effective security operations.
Learn data analysis techniques for cybersecurity using open-source tools like Security Onion and Python. Explore PANDAS, ElasticSearch, frequency analysis, and time series analysis for effective threat hunting.
Explore integrating Osquery into Security Onion for enhanced endpoint visibility and threat detection. Learn about Chrome extensions, query types, and firewall control in this informative conference talk.
Learn effective pivoting techniques to enhance threat detection and investigation skills, improving your ability to identify and catch malicious actors in cybersecurity.
Explore Snort's evolution and future in network security with Joel Esler. Gain insights into its development, key features, and upcoming innovations for effective threat detection and response.
Explore machine learning techniques for analyzing Bro logs, focusing on supervised and unsupervised methods to enhance cybersecurity threat detection and analysis.
Explore advanced ELSA features for security analysis, including Elasticsearch integration, improved syslog-ng, containerization, and new visualization tools like Ankey and geo mapping.
Explore data-driven perspectives on digital forensics and incident response, focusing on cognitive challenges, investigation processes, and analytical strategies for security professionals.
Explore ICS/SCADA network security monitoring strategies for challenging industrial environments, focusing on real-world applications, threat models, and effective monitoring techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.