Cloudflare Learning Center Logo

Cloudflare Learning Center

0
Free
Visit Website

The Cloudflare Learning Center provides educational resources on various cybersecurity and internet-related topics. It covers concepts like: - Distributed Denial of Service (DDoS) attacks and botnets - Content Delivery Networks (CDNs) and their performance, security, and reliability - Domain Name System (DNS), its security, server types, and records - Web application security, data breaches, brute force attacks, and performance optimization - Serverless computing, edge computing, and Function as a Service (FaaS) - SSL/TLS encryption protocols, certificates, and HTTPS - Bots, bot management, credential stuffing, and content scraping - Cloud computing, multicloud, hybrid cloud, and cloud firewalls - Zero Trust security principles, ZTNA, CASB, and data loss prevention - Secure Access Service Edge (SASE), ZTNA, NaaS, and NGFW - Network layer, internet fundamentals, routing, and LANs - Data privacy, GDPR, cookies, and warrant canaries - Video streaming, live streaming, encoding, and HLS - Email security, spam prevention, phishing detection, and email spoofing - Artificial Intelligence (AI), Large Language Models (LLMs), embeddings, and vector databases

FEATURES

ALTERNATIVES

A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.

A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.

A comprehensive guide for system administrators to detect and identify potential security threats on Windows 2000 systems.

A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.

A structured approach to managing and responding to suspected security events or incidents.

A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.

A comprehensive Windows command-line reference guide for security professionals, system administrators, and incident responders.