Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore electromagnetic wave propagation, antenna types, and wireless communication concepts. Learn about signal strength, system losses, and antenna characteristics for effective wireless network design.
Explore cryptography essentials including set theory, modular arithmetic, finite groups, and elliptic curves. Gain foundational knowledge for understanding modern cryptographic systems.
Explore key exchange methods, including Diffie-Hellman and elliptic curve cryptography, for secure communication and forward secrecy in modern applications.
Explore public key encryption methods, costs, and cracking techniques. Learn about RSA and its practical applications in e-security.
Learn cryptographic hashing techniques, including MD5, SHA-1, and HMAC. Explore password security, salting, and one-time password systems for enhanced digital protection.
Explore symmetric key cryptography: entropy, generators, methods, modes, and salting. Learn about AES, Twofish, 3DES, RC4, ChaCha20, and their applications in security.
Explore cryptography basics, security infrastructure, and privacy concepts. Learn about encryption, tokenization, and key management while examining real-world cybersecurity cases.
Explore lattice cryptography and Ring LWE, focusing on key exchange mechanisms and practical implementations using Python.
Explore privacy, trust, and future tech challenges with cryptography expert Bruce Schneier. Delve into encryption, IoT risks, data breaches, and policy implications in our increasingly connected world.
Explore the inner workings of Elliptic Curve Cryptography, its applications, and encryption techniques in this comprehensive overview.
Explore trusted hosts, TPM chips, encryption methods, and security measures for robust system protection and data safeguarding.
Learn about authorization, tokens, and Docker in cybersecurity. Explore single sign-on, Active Directory, smart contracts, JSON Web Tokens, and FIDO for enhanced digital security and authentication.
Explore cutting-edge cryptographic techniques including homomorphic encryption, quantum cryptography, and zero-knowledge proofs in this advanced e-security session.
Explore cryptocurrencies and blockchain technology, covering topics like digital ownership, infrastructure, mining, and smart contracts. Gain insights into the future of finance and digital assets.
Explore tunnelling in network security, covering VPNs, VLANs, and transport modes. Learn practical applications through lab demonstrations and real-world examples.
Get personalized course recommendations, track subjects and courses with reminders, and more.