The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises invo…
☆10Jan 6, 2024Updated 2 years ago
Alternatives and similar repositories for Cybersecurity-Specialization-University-Of-Maryland-Coursera
Users that are interested in Cybersecurity-Specialization-University-Of-Maryland-Coursera are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the data analytics lessons I took from the bootcamp between 5 Jan - 4 Aug 2022 and includes 48 sessions, 10 labs…☆27Feb 21, 2025Updated last year
- Repo for coursera specialization Big Data by UC San Diego☆12Aug 21, 2017Updated 8 years ago
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- It's an simple django project for django beginners. It's cover all the django basic such as views, models, urls etc.☆11Oct 8, 2020Updated 5 years ago
- Code repo for the ICML 2021 paper "Making Paper Reviewing Robust to Bid Manipulation Attacks".☆10Sep 15, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scripts for an upcoming blog "Extractive vs. Abstractive Summarization" for RaRe Technologies.☆13Apr 7, 2017Updated 9 years ago
- ☆11May 30, 2021Updated 4 years ago
- Tidy Data in Python Mini-Course by Vincent Lan [OPEN]☆10Jun 29, 2017Updated 8 years ago
- Experiment on text summarization techniques and exploring Tensorflow.☆15Apr 25, 2017Updated 9 years ago
- Small data engineering tutorial☆10Oct 24, 2018Updated 7 years ago
- Vici VC8145 multimeter alternative software☆11Mar 2, 2019Updated 7 years ago
- This repository will contain all the scripts and techniques we have used to bypass MSTG crackme challenges.☆19Feb 26, 2023Updated 3 years ago
- Data Science and Machine Learning with Python - Hands On from Udemy☆14May 11, 2017Updated 8 years ago
- a fast multiplier implement using verilog☆13Dec 23, 2014Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆15Nov 25, 2020Updated 5 years ago
- ☆13Jan 28, 2020Updated 6 years ago
- Django 2.0 Official Tutorial☆11Apr 18, 2020Updated 6 years ago
- non-anonymized cnn/dailymail dataset for text summarization☆13May 30, 2017Updated 8 years ago
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆11Apr 7, 2025Updated last year
- This is a crypto exchange website developed using Django, and you can add your specific personal token to it☆11Jul 30, 2023Updated 2 years ago
- A PHP Runtime for Sidecar☆25Aug 21, 2022Updated 3 years ago
- IBM Cybersecurity Analyst Assessment☆36Sep 1, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- Beginner-friendly collection of Python API tutorials, including Twitter data, COVID-19 data, and price information on stocks and cryptocu…☆17Jan 19, 2023Updated 3 years ago
- A curated list of resources dedicated to text summarization☆14Mar 28, 2018Updated 8 years ago
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Aug 8, 2022Updated 3 years ago
- Implementation of the CMAC keyed hash function using AES as block cipher.☆16Apr 2, 2025Updated last year
- Nice latex makefile that works out of the box☆13Dec 9, 2019Updated 6 years ago
- Simulate Attacks With Mininet And Hping3☆16Jul 1, 2021Updated 4 years ago
- ☆15Feb 2, 2026Updated 2 months ago
- Secure-D Web Application Security Test Checklist summarizes well-known weaknesses, vulnerabilities and best practices into review topics …☆21Sep 21, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This is CryptoByte a cryptocurrency android application that displays market price listing based on trade volume and market capitaliza…☆18May 26, 2021Updated 4 years ago
- Payloads for the Hak5 Bash Bunny☆13May 23, 2019Updated 6 years ago
- AVX512 population count routines☆23Aug 2, 2019Updated 6 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆16Nov 11, 2020Updated 5 years ago
- Beamer theme with nice tricks for fullscreen pictures & videos☆12Apr 19, 2021Updated 5 years ago
- Documentation for #botkit☆19Apr 11, 2022Updated 4 years ago
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago