Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to identify and analyze suspicious activities on Linux systems using Security Onion's powerful tools and techniques for enhanced endpoint security.
Explore advanced techniques for layering detection and deception to enhance network visibility and defend against cyber threats.
Explore UofSC's innovative approach to security operations, integrating SOAR technology, SOC management, and student involvement for comprehensive cybersecurity development.
Enhance security operations with SOC dashboards for improved situational awareness. Learn effective techniques to monitor and respond to threats in real-time.
Explore effective strategies for optimizing industrial control system security alerts using alarm management techniques to enhance threat detection and response.
Explore Security Onion's new Dashboards interface, designed for speed and dynamic capabilities, empowering analysts with efficient data visualization and analysis tools.
Explore the new case management interface in Security Onion 2.3.100, enhancing investigation workflows and guiding future analyses with integrated platform features.
Learn essential alert triage and case creation techniques for Security Onion, enhancing your ability to efficiently manage and respond to security incidents in this comprehensive workflow guide.
Learn to effectively tune Suricata NIDS rules in Security Onion, enhancing your network intrusion detection capabilities and optimizing alert management for improved security monitoring.
Learn to optimize Suricata NIDS rules in Security Onion for enhanced network intrusion detection. Practical guidance on managing and fine-tuning alerts for improved security monitoring.
Panel discussion with Security Onion developers exploring latest developments, challenges, and future directions in cybersecurity monitoring and threat detection.
Explore detection engineering tactics from a military perspective. Learn to template threats, analyze capabilities, and engineer detections to achieve a robust defensive posture using open-source tools.
Explore advanced threat hunting techniques using Suricata metadata, focusing on malware detection, incident response, and proactive network security strategies.
Comprehensive overview of Security Onion's latest developments, features, and future roadmap, presented by Doug Burks at the annual conference.
Explore Intrusion Detection Honeypots as a cost-effective security measure. Learn to deploy honey services in your network and integrate alerts into Security Onion's monitoring pipeline.
Get personalized course recommendations, track subjects and courses with reminders, and more.