Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore modern cyber attack techniques inspired by Stuxnet, focusing on filesystem vulnerabilities, NTFS exploits, and advanced persistence methods while learning effective defense strategies.
Discover a stealthy technique for NTLM relay attacks by hijacking port 445/tcp, featuring reverse engineering insights and automation tools for enhanced SMB-based operations with minimal detection risk.
Explore the challenges and opportunities in offensive security entrepreneurship, from industry dynamics to practical insights on building innovative security companies while maintaining hacker culture.
Discover how to streamline Red Team infrastructure deployment and management with Red Commander - a unified web platform for orchestrating engagement assets across multiple cloud providers and services.
Dive into advanced kernel rootkit techniques for red team operations and defense strategies, covering stealthy persistence, EDR evasion, and practical detection methods with hands-on demos.
Discover advanced techniques for hiding C2 communications by exploiting Windows memory page permissions, with practical approaches to building modular and stealthy command-and-control systems.
Discover how to identify, analyze, and execute ADCS attack paths using BloodHound, while learning practical remediation strategies for defending against PKI-based privilege escalation in Active Directory environments.
Explore essential security strategies and potential vulnerabilities of Large Language Models in production, covering attack vectors, defense mechanisms, and implementation best practices based on leading AI research.
Discover how to efficiently map and analyze cloud console activities with an open-source framework that simplifies the complex task of correlating hundreds of CloudTrail events to specific user actions.
Discover real-world red team operation mishaps and recovery strategies in Fortune 500 companies, exploring innovative TTPs development and mission success through candid insights from experienced security professionals.
Dive into advanced threat hunting with a custom ETW-based Sysmon replacement, exploring enhanced telemetry capabilities for detecting sophisticated red team techniques and threat actor fingerprinting.
Uncover critical security vulnerabilities in EntraID guest access, exploring unauthorized data access, SQL server dumps, and potential backdoors while learning defensive strategies for Office 365 environments.
Discover critical macOS security vulnerabilities and privilege escalation bugs affecting major software products, with practical exploitation techniques and defensive strategies for improved visibility.
Explore advanced threat hunting techniques and defense strategies against edge device compromises, focusing on detection methods, forensic analysis, and proactive security measures for network infrastructure.
Dive into advanced cybersecurity strategies for detecting and preventing Adversary-in-the-Middle phishing attacks, exploring real-world cases, detection methods, and practical defense techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.