Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore tunnelling in network security, covering VPNs, VLANs, and transport modes. Learn practical applications through lab demonstrations and real-world examples.
Explore self-sovereign identity concepts, workflows, and principles with insights on secure channels, credential issuance, verification, and revocation in digital identity management.
Explore hashing techniques, from basic methods to advanced concepts like salting and collision detection, with practical demonstrations and real-world applications in cybersecurity.
Explore e-security fundamentals, covering topics like GDPR, signatures, tokens, and public keys. Gain insights into real-world cases and practical applications in cybersecurity.
Comprehensive overview of e-security fundamentals, covering operating systems, key exchange, trust infrastructure, and tunneling. Ideal for those seeking a solid foundation in cybersecurity concepts.
Learn about tokenization techniques for data protection, including surrogate identifiers, currency tokenization, and pseudonymization. Explore best practices and advanced concepts like Feistel structures and honey encryption.
Explore elliptic curve cryptography fundamentals, applications in key exchange, digital signatures, and cryptocurrencies like Bitcoin.
Explore common web vulnerabilities and attack methods, including discovery techniques, backdoors, weak passwords, and injection attacks, to enhance your cybersecurity knowledge.
Learn essential hash cracking techniques, from basic methods to advanced tools like Hashcat. Explore salting, Windows hashes, benchmarks, and analysis for improved cybersecurity skills.
Explore hashing methods, tools, and applications in cybersecurity, including salting, collision prevention, and one-time passwords.
Explore cryptography basics, from historical ciphers to modern encryption methods, covering key concepts like frequency analysis, prime numbers, and random number generation.
Explore cryptocurrency fundamentals, Bitcoin mechanics, Ethereum setup, and smart contracts in this comprehensive overview of blockchain technology.
Explore ransomware types, mechanisms, and trends, including Ransomware-as-a-Service and cryptocurrency wallets, in this comprehensive cybersecurity overview.
Learn about ransomware's history, types, and techniques. Explore obfuscation methods, analyze real-world examples, and understand the evolving landscape of cyber threats.
Explore Pandas for data manipulation: peek, sort, filter, and analyze with mathematical functions, correlation, and covariance.
Get personalized course recommendations, track subjects and courses with reminders, and more.