Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn Decryption, earn certificates with paid and free online courses from Duke, University of Leeds, IGNOU, Tokyo Institute of Technology and other top universities around the world. Read reviews to decide if a class is right for you.
Build a Rust CLI app to encrypt/decrypt text using Caesar cipher, learning CLI development, cryptography basics, and Rust programming fundamentals.
Explore cryptography's evolution from ancient ciphers to modern techniques, learning encryption, decryption, and protocols. Gain practical skills in secure communication for personal and organizational privacy.
100% Hands-On Real World Practical Approach on Android Ethical Hacking. Learn to Prevent FACEBOOK , INSTAGRAM hacking!
Aprenda Python desde cero y descubra cómo hackear el cifrado César, explorando conceptos básicos de programación y criptografÃa de forma práctica y paso a paso.
Section 1- 8 - Beginner Level, Section 9-14 - Intermediate Level, Section 15-21 - Advanced Level.
Delve into the inner workings of cryptographic tools and techniques with the University of Leeds.
Learn computer science fundamentals, from data and computation to encryption, while gaining hands-on programming experience in Ruby. Explore cutting-edge topics like AI, data mining, and simulations.
System administrators aren't on the information security team, but by using the security tools you'll be building in this course in PowerShell, the security team will want to know where you got your skills!
Learn about how encryption helps to keep your information safe, and how it is used in the world today.
Learn encryption basics, types, algorithms, and protocols. Understand how encryption works, its differences from cryptography, and protection against brute force attacks.
Explore strategies for decrypting encrypted network traffic, focusing on TLS 1.3 challenges and solutions like SSL fingerprinting and session-key forwarding for effective network security operations.
Análise detalhada da segurança do software de votação brasileiro, baseada em resultados de um desafio de hacking restrito organizado pela autoridade eleitoral nacional.
Learn to create a basic substitution cipher encryption program in Java, covering key concepts and implementation steps.
Learn to secure sensitive data in Android using encryption, keystore system, and ciphers. Master techniques for protecting user information from potential attackers and implementing robust security measures in your Android applications.
Automated iOS app security assessment tool SIRA demonstrated, revealing common flaws in AppStore products. Explores risks, testing methods, and future improvements for mobile app security.
Get personalized course recommendations, track subjects and courses with reminders, and more.