Cloudflare Learning Center Logo

Cloudflare Learning Center

0
Free
Visit Website

The Cloudflare Learning Center provides educational resources on various cybersecurity and internet-related topics. It covers concepts like: - Distributed Denial of Service (DDoS) attacks and botnets - Content Delivery Networks (CDNs) and their performance, security, and reliability - Domain Name System (DNS), its security, server types, and records - Web application security, data breaches, brute force attacks, and performance optimization - Serverless computing, edge computing, and Function as a Service (FaaS) - SSL/TLS encryption protocols, certificates, and HTTPS - Bots, bot management, credential stuffing, and content scraping - Cloud computing, multicloud, hybrid cloud, and cloud firewalls - Zero Trust security principles, ZTNA, CASB, and data loss prevention - Secure Access Service Edge (SASE), ZTNA, NaaS, and NGFW - Network layer, internet fundamentals, routing, and LANs - Data privacy, GDPR, cookies, and warrant canaries - Video streaming, live streaming, encoding, and HLS - Email security, spam prevention, phishing detection, and email spoofing - Artificial Intelligence (AI), Large Language Models (LLMs), embeddings, and vector databases

FEATURES

ALTERNATIVES

A pocket reference guide providing various options for navigating and pivoting through different environments and situations.

A behavior-based malware detection system for Android platforms that uses crowdsourcing to detect anomalies and malware in applications.

A comprehensive Windows command-line reference guide for security professionals, system administrators, and incident responders.

A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.

A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.

A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.

A collection of mobile security resources and tools