Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn essential concepts of data loss prevention, including security taxonomy, compliance, data leakage, and key techniques like hexadecimal encoding and hash signatures.
Explore advanced cryptography concepts through hands-on lab exercises focusing on tunnels, network captures, and OpenSSL implementation.
Explore tunnelling modes, secure sockets, OpenSSL, Heartbleed vulnerability, VPNs, and key exchange methods in network security protocols like SSL/TLS.
Explore hashing techniques, salted passwords, and rainbow tables in cryptography through hands-on lab exercises and practical demonstrations.
Explore hashing techniques, including basic types, salting, collisions, and applications in Windows, message authentication, and one-time passwords.
Explore ciphers and cryptography fundamentals, including Morse code, Caesar cipher, frequency analysis, and key concepts like prime numbers and random number generators.
Explore wireless LAN fundamentals, including IEEE 802.11 standards, bandwidth, channel frequency, and power management for a comprehensive understanding of wireless networking.
Explore radio wave fundamentals, electromagnetic principles, and wireless network types in this comprehensive introduction to WLAN technology and standards.
Explore identity in cryptography, covering authentication factors, password challenges, and biometric methods for enhanced digital security.
Explore public key cryptography, hash functions, and key exchange methods. Learn about block vs. stream ciphers, salting, and one-way hashing for enhanced digital security.
Explore private key encryption, key cracking techniques, and cryptography fundamentals. Learn about cipher text conversion, key sizes, and brute force attacks.
Explore Multilayer Switching concepts, including CAM tables, route processing, and CEF operations, enhancing network performance and efficiency.
Explore network attack traffic and data mining techniques, including statistics, Nmap, Hydra, and crosscorrelation analysis for enhanced cybersecurity understanding.
Hands-on lab exploring vulnerability analysis and penetration testing techniques, covering network scanning, fingerprinting, and security tool usage for identifying system weaknesses.
Hands-on lab exploring vulnerability scanning, penetration testing, and network security techniques to identify and assess system weaknesses.
Get personalized course recommendations, track subjects and courses with reminders, and more.