Forem

# education

Discussions on academic programs, online courses, and learning paths in security.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How Hackers Read Your Messages Without Touching Your Phone: What You Need to Know
Cover image for How Hackers Read Your Messages Without Touching Your Phone: What You Need to Know

How Hackers Read Your Messages Without Touching Your Phone: What You Need to Know

6
Comments
6 min read
Understanding ADHD Coaching: A Path to Clarity, Confidence, and Control

Understanding ADHD Coaching: A Path to Clarity, Confidence, and Control

Comments
3 min read
Linus Tech Tips (LTT): His House Burned Down. I Brought Help

Linus Tech Tips (LTT): His House Burned Down. I Brought Help

Comments
1 min read
🎧 Month 2 – Day 31 – 60 IELTS Format bosqichi)

🎧 Month 2 – Day 31 – 60 IELTS Format bosqichi)

Comments
4 min read
Jeff Su: How to Create Cinematic AI Videos (No-BS Guide)

Jeff Su: How to Create Cinematic AI Videos (No-BS Guide)

Comments
1 min read
Offline Souls, Online Noise (Dead Internet) PART 1
Cover image for Offline Souls, Online Noise (Dead Internet) PART 1

Offline Souls, Online Noise (Dead Internet) PART 1

12
Comments 1
3 min read
SIEM vs. SOAR

SIEM vs. SOAR

Comments
6 min read
Veritasium: World's Most Explosive Liquid

Veritasium: World's Most Explosive Liquid

Comments
1 min read
How to Recognize a Real vs Fake Cybersecurity Alert
Cover image for How to Recognize a Real vs Fake Cybersecurity Alert

How to Recognize a Real vs Fake Cybersecurity Alert

Comments
9 min read
Building a Conscious Cybersecurity System: How We Apply Integrated Information Theory to Threat Hunting
Cover image for Building a Conscious Cybersecurity System: How We Apply Integrated Information Theory to Threat Hunting

Building a Conscious Cybersecurity System: How We Apply Integrated Information Theory to Threat Hunting

Comments
40 min read
Is Your Business Prepared? A Deep Dive into Cyber Risk Management
Cover image for Is Your Business Prepared? A Deep Dive into Cyber Risk Management

Is Your Business Prepared? A Deep Dive into Cyber Risk Management

6
Comments
13 min read
Jeff Su: The REALITY of AI Video in 2025 (it’s not what you think)

Jeff Su: The REALITY of AI Video in 2025 (it’s not what you think)

1
Comments
1 min read
Unlock Guitar Soloing Secrets: A Graph Engine Approach by Arvind Sundararajan

Unlock Guitar Soloing Secrets: A Graph Engine Approach by Arvind Sundararajan

Comments
2 min read
Realised vs Unrealised P/L — Money in Your Pocket vs Money on Paper
Cover image for Realised vs Unrealised P/L — Money in Your Pocket vs Money on Paper

Realised vs Unrealised P/L — Money in Your Pocket vs Money on Paper

Comments 1
2 min read
picoCTF RPS writeup

picoCTF RPS writeup

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.