Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Cryptography
#Block Ciphers
#Public Key Cryptography
#Cryptanalysis
#Symmetric Encryption
#Asymmetric Encryption
#Encryption
#AES
#Hashing
#Caesar Cipher
#Password Hashing
#Encryption Algorithms
#Zero-Knowledge Proofs
#End-to-End Encryption
#Verifiable Computation
#Stream Ciphers
#Enigma Machine
#Quantum Cryptography
#Covert Communication
#Elliptic Curves
#Key Management
Showing:
4,059
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Great Learning
Cyber Security Expert
7
rewiews
In this course, you will gain insights on how to improve your skills to be a Cyber Security Expert and what are their roles and responsibilities.
Add to list
14
Lesons
57 minutes
On-Demand
Free-Video
Stanford University
Martin Hellman: The Wisdom of Foolishness
1
rewiews
Explore how Martin Hellman's unconventional approach to cryptography led to groundbreaking discoveries, challenging established norms and defying expectations in the field of information security.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
NPTEL
Introduction to Cryptology
1
rewiews
Explore cryptology fundamentals, including ciphers, perfect secrecy, public key systems, and hash functions. Learn algorithms and techniques for secure communication and data protection.
Add to list
20
Lesons
10 hours
On-Demand
Free-Video
Caleb Curry
Cryptography
1
rewiews
Comprehensive introduction to cryptography covering encryption methods, public key systems, digital signatures, and hashing algorithms with practical examples and code demonstrations.
Add to list
7
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Net Ninja
Node.js Auth Tutorial - JWT
1
rewiews
In this Node Auth tutorial series I'll show you how to implement authentication using Node, Express & JSON web tokens (JWT).
Add to list
18
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Bug Bounty Training Lessons and Bug Bounty Tutorials
1
rewiews
Comprehensive bug bounty training covering various security vulnerabilities, testing techniques, and tools. Ideal for aspiring ethical hackers and cybersecurity professionals.
Add to list
79
Lesons
20 hours
On-Demand
Free-Video
Web3 Foundation
Web3 Blockchain Fundamentals MOOC
1
rewiews
The Web3 Foundation “Blockchain for Beginners” MOOC teaches blockchain from the very basics all the way up to building your own blockchain. The course is led by Bill Laboon, Web3 Foundation’s technical education lead.
Add to list
20
Lesons
11 hours
On-Demand
Free-Video
Python Simplified
Python TDD Workflow - Unit Testing Code Example for Beginners
1
rewiews
Learn Test-Driven Development in Python by implementing Caesar's Cipher. Practice unit testing, follow TDD principles, and participate in a coding challenge to reinforce your new skills.
Add to list
19
Lesons
26 minutes
On-Demand
Free-Video
IEEE
A Tale of Sea and Sky - On the Security of Maritime VSAT Communications
2
rewiews
Explores security vulnerabilities in maritime VSAT communications, revealing potential threats and demonstrating practical attacks using affordable equipment. Discusses implications and challenges for maritime cybersecurity.
Add to list
15
Lesons
17 minutes
On-Demand
Free-Video
Stanford University
Amy Zegart - Spies, Lies, and Algorithms
0
rewiews
Explore the evolving landscape of intelligence in the digital age, examining challenges, emerging technologies, and the democratization of espionage in our interconnected world.
Add to list
26
Lesons
1 hour 1 minute
On-Demand
Free-Video
Stanford University
Cybersecurity in the Modern Era - Zero Knowledge Proofs Explained
0
rewiews
Unravel zero-knowledge proofs and post-quantum signatures with cryptography expert Dan Boneh. Gain insights into cutting-edge cybersecurity technologies shaping data protection and future cryptographic challenges.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Stanford University
Solving Cybersecurity as an Economic Problem
0
rewiews
Explore innovative approaches to cybersecurity, focusing on economic perspectives and moving target defense strategies to combat prevalent cyberattacks and vulnerabilities.
Add to list
30
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Stanford University
Cryptocurrencies and Blockchains - The Science Behind the Technology
0
rewiews
Explore the science behind blockchains, decentralized applications, and future trends with Stanford professor Dan Boneh in this comprehensive webinar on cryptocurrency technology.
Add to list
21
Lesons
1 hour 1 minute
On-Demand
Free-Video
Stanford University
The Evolution of Public Key Cryptography
0
rewiews
Explore the history and development of public key cryptography, including contributions from unsung heroes and the revolutionary impact on modern security systems.
Add to list
1
Lesons
1 hour 15 minutes
On-Demand
Free-Video
Stanford University
Stanford Seminar - Challenges in Secure Messaging
0
rewiews
Explore challenges in secure messaging, including encryption, key distribution, and user adoption. Learn about modern tools and protocols like CONIKS for safeguarding communications against mass surveillance.
Add to list
25
Lesons
1 hour 29 minutes
On-Demand
Free-Video
Stanford University
Zero Knowledge Proofs for Verifiable Computation on Blockchain Systems - Panel Discussion
0
rewiews
Expert panel explores zero knowledge proofs for verifiable computation on blockchain systems, discussing applications, challenges, and future potential in Web3 technologies.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Massachusetts Institute of Technology
Cryptocurrency Engineering and Design - Spring 2018
0
rewiews
Explore Bitcoin and cryptocurrency design, focusing on cryptography, game theory, and network architecture. Gain insights into blockchain technology, mining, transactions, and advanced concepts like Lightning Network.
Add to list
20
Lesons
1 day 1 hour
On-Demand
Free-Video
Massachusetts Institute of Technology
Missing Semester IAP 2020
0
rewiews
Comprehensive series on essential computing skills, covering shell scripting, vim, data wrangling, version control, debugging, metaprogramming, and security for enhanced productivity.
Add to list
11
Lesons
10 hours
On-Demand
Free-Video
NPTEL
Cryptography and Network Security
0
rewiews
Explore modern cryptography, network security, and cryptanalysis techniques. Learn about symmetric and asymmetric encryption, hash functions, and secure communication protocols.
Add to list
41
Lesons
1 day 12 hours
On-Demand
Free-Video
Santa Fe Institute
Sending Secrets - Cryptography & Privacy in a Quantum World
0
rewiews
Explore cryptography's evolution, from ancient methods to quantum challenges, and discover potential future-proof encryption techniques. No advanced math required.
Add to list
23
Lesons
1 hour 21 minutes
On-Demand
Free-Video
Santa Fe Institute
The Transformative Power of Information
0
rewiews
Explore the transformative power of information in biology, featuring insights on communication, data, and technological advancements from a leading complexity scientist.
Add to list
9
Lesons
26 minutes
On-Demand
Free-Video
Santa Fe Institute
Provably-Secure Proof-of-Stake Blockchains - From Bitcoin to Ouroboros
0
rewiews
Explore proof-of-stake blockchains as an energy-efficient alternative to Bitcoin's proof-of-work, focusing on the Ouroboros protocol's security and implementation in Cardano cryptocurrency.
Add to list
23
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Santa Fe Institute
Sending Secrets: Security and Cryptography in a Quantum World
0
rewiews
Explore cryptography's evolution, from Caesar's cipher to quantum computing challenges. Learn about modern encryption, prime numbers, and the potential impact of quantum computers on cybersecurity.
Add to list
19
Lesons
1 hour 10 minutes
On-Demand
Free-Video
Santa Fe Institute
Models of Identity Signaling
0
rewiews
Explore mathematical models of identity signaling, examining their impact on cooperation, conflict, and social learning in complex human behavior and communication strategies.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
NPTEL
Quantum Information and Computing
0
rewiews
The course is Primarily for Students of Physics and Engineering having exposure to basic quantum mechanics and knowledge of Linear Algebra.
Add to list
46
Lesons
21 hours
On-Demand
Free-Video
NPTEL
Quantum Information and Computing
0
rewiews
The course is Primarily for Students of Physics and Engineering having exposure to basic quantum mechanics and knowledge of Linear Algebra.
Add to list
46
Lesons
21 hours
On-Demand
Free-Video
University of Oxford
Andrew Wiles Talks to Hannah Fry
0
rewiews
Renowned mathematician Andrew Wiles discusses his work on Elliptic Curves and shares insights on motivation, resilience, and mathematics education in a captivating conversation with Hannah Fry.
Add to list
19
Lesons
1 hour 9 minutes
On-Demand
Free-Video
New York University (NYU)
The Evolution of Public Key Cryptography
0
rewiews
Explore the historical development of public key cryptography, including key contributors, breakthroughs, and challenges faced in its evolution from conventional methods to modern systems.
Add to list
19
Lesons
49 minutes
On-Demand
Free-Video
New York University (NYU)
Cyber Security: Building Compromise Resilient Systems and Key Management - Dr. Justin Cappos
0
rewiews
Explore critical cybersecurity topics with Dr. Justin Cappos, focusing on building resilient systems, key management, and operational security for production environments facing potential attacks.
Add to list
10
Lesons
33 minutes
On-Demand
Free-Video
NPTEL
Foundations of Cryptography
0
rewiews
Comprehensive exploration of cryptographic concepts, from historical ciphers to modern techniques, covering encryption, security, hash functions, and public key systems.
Add to list
9
Lesons
5 hours
On-Demand
Free-Video
Devoxx
A Passwordless Future - Passkeys for Java Developers
0
rewiews
Explore the revolutionary world of passkeys in this 52-minute conference talk from Devoxx. Dive deep into the Web Authentication standard and discover how passkeys are transforming authentication methods for enhanced security. Learn about the core concep…
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Devoxx
Securing LLM-Powered Applications - Overcoming Security and Privacy Challenges
0
rewiews
Explore the security and privacy challenges of LLM-powered applications in this 51-minute conference talk from Devoxx. Delve into common issues like prompt injection, key leakage, and misuse of private customer data for model training. Gain insights on l…
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Devoxx
Privacy in Practice with Smart Pseudonymization - Lessons from the Belgian Public Sector
0
rewiews
Explore the evolution and implementation of privacy protection technologies in this 50-minute conference talk from Devoxx. Trace the history of identity concealment from ancient physical masks to modern digital pseudonymization techniques. Discover how t…
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Bill Buchanan OBE
World-leaders in Cryptography - Yuriy Polyakov
0
rewiews
Explore lattice-based cryptography, homomorphic encryption, and privacy-preserving machine learning with Duality Technologies' VP of Cryptography, Yuriy Polyakov.
Add to list
1
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Bill Buchanan OBE
World-leaders in Cryptography - Kurt Rohloff
0
rewiews
Explore homomorphic encryption with Kurt Rohloff, co-founder of PALISADE and OpenFHE libraries, and CTO of Duality Technologies. Gain insights into cutting-edge cryptographic advancements.
Add to list
1
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Cloud Security Alliance
Security in the Quantum Era: Preparing for Post-Quantum Cryptography
0
rewiews
Explore post-quantum and quantum cryptography, preparing for cybersecurity challenges in the quantum era. Stay informed about emerging threats and solutions.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Cloud Security Alliance
HSMs and Key Management in the Cloud - Securing Your Keys and Safeguarding Your Data
0
rewiews
Explore cloud-based HSMs and key management strategies to enhance data security and protect sensitive information in cloud environments.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Cloud Security Alliance
Cloud Security: Current Challenges, Emerging Technologies, and Recommendations
0
rewiews
Explore cloud security challenges, emerging technologies, and practical recommendations to safeguard sensitive data and applications in rapidly evolving cloud environments.
Add to list
9
Lesons
25 minutes
On-Demand
Free-Video
Cloud Security Alliance
What Cloud HSM Means to Financial Services
0
rewiews
Explore the impact of Cloud HSM on financial services, focusing on security implications and industry-specific applications.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
MLOps World: Machine Learning in Production
Private, Local AI: Running Open-Source LLMs Locally
0
rewiews
Explore private AI applications running open-source LLMs locally on personal devices. Learn about encrypted environments for fine-tuning models on sensitive data.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Cloud Security Alliance
Minutes, Not Months - Lightning Fast Cloud PKI Solutions
0
rewiews
Explore modern PKI for proven security and identity at scale, covering IoT, in-country, on-prem, and hybrid landscapes. Learn cloud transformation fundamentals.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
ICTP-SAIFR
Quantum Networks for Quantum Computers - Class 2
0
rewiews
Explore quantum networks for quantum computers, focusing on advanced concepts and applications in this comprehensive lecture by Juan José García Ripoll.
Add to list
1
Lesons
1 hour 20 minutes
On-Demand
Free-Video
Institute for Advanced Study
Reading Alan Turing - Exploring Turing's Influential Ideas in Theoretical Computer Science
0
rewiews
Explore Turing's influential papers and their impact on theoretical computer science with Avi Wigderson. Gain insights into Turing's visionary ideas and their modern relevance.
Add to list
1
Lesons
1 hour 11 minutes
On-Demand
Free-Video
Satish C J
Wireless Network Security Protocols: WEP, WPA, WPA2, and Four-Way Handshake
0
rewiews
Explore wireless network security protocols, including WEP, WPA, and WPA2. Understand their evolution, vulnerabilities, and the importance of staying updated for better Wi-Fi protection.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Practical Networking
Diffie-Hellman Key Exchange and Forward Secrecy
0
rewiews
Explore Diffie-Hellman key exchange and forward secrecy. Learn simplified and real-world math behind this secure cryptographic method, enhancing your understanding of modern encryption techniques.
Add to list
8
Lesons
13 minutes
On-Demand
Free-Video
Institute for Advanced Study
Subgroup Tests and the Aldous-Lyons Conjecture
0
rewiews
Explore the refutation of the Aldous-Lyons conjecture through novel interactive proof systems and subgroup tests, connecting complexity theory to probability theory and group theory.
Add to list
1
Lesons
1 hour 14 minutes
On-Demand
Free-Video
ICTP-SAIFR
High Dimensional Quantum Communication with Structured Light - Class 1
0
rewiews
Explore high-dimensional quantum communication using structured light in this advanced physics lecture by Antonio Zelaquett from UFF-Niteroi, Brazil.
Add to list
1
Lesons
1 hour 24 minutes
On-Demand
Free-Video
ICTP-SAIFR
High Dimensional Quantum Communication with Structured Light - Class 2
0
rewiews
Explore high-dimensional quantum communication using structured light in this advanced physics lecture by Antonio Zelaquett, delving into cutting-edge concepts and applications.
Add to list
1
Lesons
1 hour 19 minutes
On-Demand
Free-Video
ICTP-SAIFR
High Dimensional Quantum Communication with Structured Light - Class 3
0
rewiews
Explore high-dimensional quantum communication using structured light, focusing on advanced concepts and applications in quantum information science.
Add to list
1
Lesons
1 hour 24 minutes
On-Demand
Free-Video
Bill Buchanan OBE
World-leaders in Cryptography - Phillip Rogaway
0
rewiews
Dive into the groundbreaking work of cryptography pioneer Phillip Rogaway, exploring his contributions to random oracles, symmetric key modes, and ethical considerations in the field.
Add to list
1
Lesons
1 hour 34 minutes
On-Demand
Free-Video
Anyscale
Generative AI and Proprietary Data: Ensuring Security in Enterprise AI Adoption
0
rewiews
Unlock secure enterprise AI adoption with confidential computing. Learn how to leverage LLMs while keeping sensitive data encrypted throughout the AI workflow, maintaining prediction quality and data privacy.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Conference on Computer-Aided Verification
Privacy-preserving Automated Reasoning
0
rewiews
Explore privacy-preserving formal reasoning techniques, including ppSAT solver and zero-knowledge protocols for Boolean formula unsatisfiability, advancing automated verification while maintaining data privacy.
Add to list
1
Lesons
1 hour 16 minutes
On-Demand
Free-Video
Unacademy
NTA UGC NET ICT
0
rewiews
We will cover the entire syllabus, strategy, updates, and notifications which will help you to crack the NTA UGC NET exams. Our educators will be sharing a lot of tips and tricks to crack the exam.
Add to list
92
Lesons
2 days 22 hours
On-Demand
Free-Video
HackerOne
Hacker101
0
rewiews
Learn essential bug bounty hunting skills through comprehensive video tutorials covering web security, exploitation techniques, and ethical hacking practices.
Add to list
27
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Great Learning
Hashing in Java
0
rewiews
Explore Java hashing concepts, including collision handling, HashTable, HashMap, LinkedHashMap, HashSet, and LinkedHashSet. Learn implementation techniques and problem-solving strategies.
Add to list
10
Lesons
1 hour 10 minutes
On-Demand
Free-Video
Great Learning
What Is Blockchain - Blockchain Technology
0
rewiews
Comprehensive introduction to blockchain technology, covering its fundamentals, applications, and industry impact. Includes demonstrations and examples for practical understanding.
Add to list
21
Lesons
2 hours 33 minutes
On-Demand
Free-Video
Great Learning
Encryption
0
rewiews
Learn encryption basics, types, algorithms, and protocols. Understand how encryption works, its differences from cryptography, and protection against brute force attacks.
Add to list
13
Lesons
37 minutes
On-Demand
Free-Video
Create Basic Network Using Hyperledger Fabric 2.0
0
rewiews
Comprehensive guide to creating and managing a Hyperledger Fabric 2.0 network, covering setup, configuration, chaincode development, SDK usage, and advanced features.
Add to list
63
Lesons
12 hours
On-Demand
Free-Video
Hussein Nasser
Everything Related to Transport Layer Security - TLS
0
rewiews
Comprehensive exploration of TLS, covering protocols, handshakes, security features, and real-world applications. Ideal for those seeking in-depth understanding of secure communication.
Add to list
30
Lesons
8 hours
On-Demand
Free-Video
Tech with Tim
Sets and Dictionaries - Python
0
rewiews
Learn about Python's sets and dictionaries, their efficient hashing mechanisms, and practical applications through hands-on tutorials covering methods, time complexity, and implementation.
Add to list
3
Lesons
30 minutes
On-Demand
Free-Video
Bogdan Stashchuk
SSL, TLS and HTTPS Overview
0
rewiews
Comprehensive overview of SSL, TLS, and HTTPS protocols, covering encryption methods, key exchange algorithms, and practical analysis using Wireshark.
Add to list
20
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Blockchain Technology Tutorial - Explained
0
rewiews
Comprehensive tutorial covering blockchain fundamentals, cryptography, architecture, Ethereum, smart contracts, and practical implementation with hands-on examples and front-end integration.
Add to list
21
Lesons
2 hours 3 minutes
On-Demand
Free-Video
Spring Security Tutorial
0
rewiews
Comprehensive guide to Spring Security, covering authentication, MySQL integration, password encoding, form login, and OAuth 2.0 implementation for robust application security.
Add to list
7
Lesons
1 hour 7 minutes
On-Demand
Free-Video
Traversy Media
Learn the MERN Stack - JWT Authentication
0
rewiews
Implement JWT authentication in MERN stack applications. Learn user registration, password hashing, token generation, and secure route protection for robust API security.
Add to list
16
Lesons
52 minutes
On-Demand
Free-Video
CISSP
0
rewiews
Comprehensive cybersecurity training covering risk management, asset security, engineering, networking, access management, and secure development. Prepares for CISSP certification and career advancement.
Add to list
67
Lesons
1 day 7 hours
On-Demand
Free-Video
CISSP Training for Cyber Security
0
rewiews
Comprehensive CISSP certification preparation covering key domains, security concepts, and exam strategies for aspiring cybersecurity professionals.
Add to list
13
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Bitcoin- The Beauty of Mathematics
0
rewiews
Explore the mathematical foundations and principles behind Bitcoin through a comprehensive 14-part series, uncovering the elegance and complexity of cryptocurrency technology.
Add to list
14
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Miscellaneous Malware Analysis
0
rewiews
Explore diverse malware analysis techniques, from deobfuscation and reverse engineering to hunting and classification. Gain practical skills in handling various malware types and writing analysis reports.
Add to list
15
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Malware Analysis Tips and Tricks
0
rewiews
Explore advanced malware analysis techniques, including deobfuscation, .NET reversing, and ransomware analysis. Learn to dissect and counter various malware types using specialized tools and methods.
Add to list
13
Lesons
9 hours
On-Demand
Free-Video
Kali Linux
0
rewiews
Comprehensive tutorial covering Kali Linux essentials, advanced techniques, and tools for cybersecurity enthusiasts and ethical hackers.
Add to list
41
Lesons
8 hours
On-Demand
Free-Video
Kali Linux Tutorials
0
rewiews
Learn Kali Linux pentesting techniques, including steganography, OWASP vulnerabilities, tool configuration, and CTF challenges. Hands-on tutorials cover essential hacking skills and real-world scenarios.
Add to list
17
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Great Learning
Core Java
0
rewiews
Comprehensive Java programming tutorial covering core concepts, OOP, collections, multithreading, and lambda expressions. Ideal for beginners and intermediate learners seeking practical skills.
Add to list
29
Lesons
9 hours 6 minutes
On-Demand
Free-Video
Hussein Nasser
What Does It Take to Break Bitcoin’s Encryption? - The Backend Engineering Show
0
rewiews
Explore Bitcoin's encryption, public key cryptography, and security measures. Learn about wallet vulnerabilities, transaction verification, and potential attack vectors in this comprehensive overview.
Add to list
10
Lesons
32 minutes
On-Demand
Free-Video
Hussein Nasser
Making TLS Handshake More Secure - The New Encrypted Client Hello TLS Extension
0
rewiews
Explore the new Encrypted Client Hello TLS extension, its implementation, benefits, and potential limitations in enhancing TLS handshake security and privacy.
Add to list
5
Lesons
28 minutes
On-Demand
Free-Video
Hussein Nasser
Five Password Authentications From Least to Most Secure - Explained with NodeJS & Postgres
0
rewiews
Explore five password authentication methods, from basic to advanced, using NodeJS and Postgres. Learn to implement secure login systems and understand the pros and cons of each approach.
Add to list
6
Lesons
25 minutes
On-Demand
Free-Video
Hussein Nasser
TCP Tunneling Applications - Pros and Cons Explained by Example
0
rewiews
Explore TCP tunneling, its applications, and pros/cons. Learn about VPNs, securing connections, bypassing firewalls, and achieving anonymity through practical examples and explanations.
Add to list
9
Lesons
30 minutes
On-Demand
Free-Video
Mirantis
Security Hardening for Containerized Deployments Across Multi Clouds - With Mirantis & Entrust
0
rewiews
Explore robust cryptography for containerized applications, focusing on enhancing security with hardware security modules (HSMs) to improve data protection and regulatory compliance in multi-cloud environments.
Add to list
17
Lesons
35 minutes
On-Demand
Free-Video
Microsoft
Practicing Python with Ciphers - Open Code Garden 1
0
rewiews
Learn Python through hands-on cipher cracking in this interactive coding session. Practice with print statements, variables, functions, and Caesar ciphers while decoding secret messages.
Add to list
11
Lesons
59 minutes
On-Demand
Free-Video
Microsoft
Practicing Python with Ciphers - Open Code Garden 1
0
rewiews
Learn Python by cracking ciphers in this hands-on coding session. Practice with Caesar ciphers, explore VS Code, and discover key programming concepts while decoding secret messages.
Add to list
15
Lesons
1 hour
On-Demand
Free-Video
Tech with Tim
Python Blog Tutorial - Flask User Authentication and Security
0
rewiews
Learn to implement user authentication and security features in a Flask-based blog application, including sign-in, sign-out, and account creation functionalities.
Add to list
11
Lesons
52 minutes
On-Demand
Free-Video
Hussein Nasser
Your DNS Queries Will Eventually Look Like This - DNS Encoding
0
rewiews
Explore DNS cache poisoning prevention through 0x20 encoding, a technique that randomizes letter casing in DNS queries to enhance security and resist attacks.
Add to list
8
Lesons
26 minutes
On-Demand
Free-Video
Traversy Media
Node.js With Passport Authentication - Full Project
0
rewiews
Build a complete authentication app with Node.js, Express, Passport, and Mongoose. Learn to implement login, registration, and access control in a full-stack project.
Add to list
30
Lesons
1 hour 25 minutes
On-Demand
Free-Video
Institute for Advanced Study
Imitation Games - Avi Wigderson
0
rewiews
Explore cryptography, randomness, and privacy with Avi Wigderson in this talk on imitation games, covering modern encryption, pseudorandomness, and differential privacy.
Add to list
18
Lesons
1 hour 21 minutes
On-Demand
Free-Video
Institute for Advanced Study
Strong Approximation for the Markoff Equation via Nonabelian Level Structures - William Chen
0
rewiews
Explore strong approximation for the Markoff equation through nonabelian level structures on elliptic curves, delving into representation varieties and modular interpretations.
Add to list
11
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Institute for Advanced Study
Instance-Hiding Schemes for Private Distributed Learning
0
rewiews
Explore private distributed learning techniques, including instance-hiding schemes, cryptographic methods, and data augmentation, with insights on privacy laws and practical applications.
Add to list
15
Lesons
1 hour 14 minutes
On-Demand
Free-Video
Institute for Advanced Study
Mathematics in Cryptography - Toni Bluher
0
rewiews
Explore the mathematical foundations of cryptography, from basic ciphers to advanced concepts, with insights from a National Security Agency expert.
Add to list
13
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Simons Institute
Watermarking LLM Outputs: Technical and Political Challenges
0
rewiews
Explore the current challenges and future directions of LLM output watermarking, examining technical hurdles and political considerations for effective implementation.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Simons Institute
Edit Distance Robust Watermarks - Beyond Substitution Channels in Language Models
0
rewiews
Delve into advanced watermarking techniques for language models, focusing on robust detection methods that withstand text modifications while maintaining cryptographic undetectability.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Simons Institute
Pseudorandom Error-Correcting Codes with Applications to Watermarking Generative AI
0
rewiews
Explore the innovative framework of pseudorandom error-correcting codes and their application in watermarking AI-generated content, focusing on cryptographic implementations and robustness guarantees.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Simons Institute
Private Retrieval-Augmented Generation: Secure Search Systems for LLMs
0
rewiews
Explore secure Retrieval-Augmented Generation through Compass, a cryptographic system enabling private semantic search with high accuracy while protecting sensitive data and queries.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Ethereum Engineering Group
ConsenSys zkEVM Rollup - 100% EVM Equivalent Zero-Knowledge Rollup
0
rewiews
Dive into ConsenSys's zkEVM Rollup technology, exploring its complete EVM equivalence and the groundbreaking implications for Ethereum scaling through private testnet implementation.
Add to list
1
Lesons
1 hour 8 minutes
On-Demand
Free-Video
Ethereum Engineering Group
Ethereum's First Steps Towards Serious Scalability - EIP-4844 Proto-danksharding
0
rewiews
Dive into EIP-4844 (Proto-danksharding) and understand how this groundbreaking proposal aims to enhance Ethereum's scalability through innovative blockchain architecture modifications.
Add to list
1
Lesons
1 hour 24 minutes
On-Demand
Free-Video
Ethereum Engineering Group
Using Zero Knowledge Proofs to Scale Ethereum - NFT Trading and Layer 2 Solutions
0
rewiews
Delve into Zero-Knowledge Proofs and their role in scaling Ethereum, focusing on NFT trading systems, Layer 2 solutions like StarkNet, and cross-layer trading implementations.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Ethereum Engineering Group
Polygon Miden - Extending Ethereum with Zero Knowledge Systems
0
rewiews
Explore Polygon Miden's innovative zero-knowledge system and its novel approach to scaling Ethereum through rollups while prioritizing ZK-friendliness over EVM compatibility.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Ethereum Engineering Group
Open Research Problems in Rollup Design
0
rewiews
Explore critical research challenges and design considerations in rollup technology for blockchain scaling with insights from Dr. Franck Cassez's technical analysis.
Add to list
1
Lesons
1 hour 8 minutes
On-Demand
Free-Video
Ethereum Engineering Group
Bootstrapping AI with Web3 Tools - A Technical Overview
0
rewiews
Explore the intersection of AI and Web3 technologies through expert insights on leveraging blockchain-based tools for artificial intelligence development and implementation.
Add to list
1
Lesons
1 hour 38 minutes
On-Demand
Free-Video
Ethereum Engineering Group
Immutable zkEVM and Passport Wallet Architecture and Security
0
rewiews
Dive into the architecture and security aspects of Immutable zkEVM and Passport Wallet, exploring cross-chain functionality, wallet contracts, and potential security threats.
Add to list
14
Lesons
53 minutes
On-Demand
Free-Video
Ethereum Engineering Group
Decentralized Sequencer Consensus Algorithms for ZK Rollups - Requirements and Design
0
rewiews
Dive into advanced research on decentralized sequencer consensus algorithms, exploring requirements, POS design, and implementation challenges for zk rollups.
Add to list
16
Lesons
56 minutes
On-Demand
Free-Video
Ethereum Engineering Group
Fair Sequencing: Using Verifiable Random Functions for Rollup Transaction Ordering
0
rewiews
Explore how Verifiable Random Functions can be implemented to achieve fair transaction sequencing in rollups, focusing on cutting-edge research and practical applications.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Ethereum Engineering Group
Economics of Zero Knowledge Rollups on Ethereum
0
rewiews
Dive into the economic analysis of optimistic and ZK rollups in Ethereum's ecosystem, exploring Layer 2 solutions, revenue models, and decentralization strategies.
Add to list
20
Lesons
1 hour 9 minutes
On-Demand
Free-Video
load more...