The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises invo…
☆10Jan 6, 2024Updated 2 years ago
Alternatives and similar repositories for Cybersecurity-Specialization-University-Of-Maryland-Coursera
Users that are interested in Cybersecurity-Specialization-University-Of-Maryland-Coursera are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the data analytics lessons I took from the bootcamp between 5 Jan - 4 Aug 2022 and includes 48 sessions, 10 labs…☆28Feb 21, 2025Updated last year
- Repo for coursera specialization Big Data by UC San Diego☆12Aug 21, 2017Updated 8 years ago
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- It's an simple django project for django beginners. It's cover all the django basic such as views, models, urls etc.☆11Oct 8, 2020Updated 5 years ago
- Code repo for the ICML 2021 paper "Making Paper Reviewing Robust to Bid Manipulation Attacks".☆10Sep 15, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Scripts for an upcoming blog "Extractive vs. Abstractive Summarization" for RaRe Technologies.☆13Apr 7, 2017Updated 9 years ago
- ☆10May 30, 2021Updated 4 years ago
- Tidy Data in Python Mini-Course by Vincent Lan [OPEN]☆10Jun 29, 2017Updated 8 years ago
- Experiment on text summarization techniques and exploring Tensorflow.☆15Apr 25, 2017Updated 9 years ago
- Small data engineering tutorial☆10Oct 24, 2018Updated 7 years ago
- Vici VC8145 multimeter alternative software☆11Mar 2, 2019Updated 7 years ago
- This repository will contain all the scripts and techniques we have used to bypass MSTG crackme challenges.☆19Feb 26, 2023Updated 3 years ago
- Data Science and Machine Learning with Python - Hands On from Udemy☆14May 11, 2017Updated 9 years ago
- a fast multiplier implement using verilog☆13Dec 23, 2014Updated 11 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆15Nov 25, 2020Updated 5 years ago
- ☆14Jan 28, 2020Updated 6 years ago
- Django 2.0 Official Tutorial☆11Apr 18, 2020Updated 6 years ago
- non-anonymized cnn/dailymail dataset for text summarization☆13May 30, 2017Updated 8 years ago
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆11Apr 7, 2025Updated last year
- This is a crypto exchange website developed using Django, and you can add your specific personal token to it☆11Jul 30, 2023Updated 2 years ago
- A PHP Runtime for Sidecar☆25Aug 21, 2022Updated 3 years ago
- IBM Cybersecurity Analyst Assessment☆36Sep 1, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- Beginner-friendly collection of Python API tutorials, including Twitter data, COVID-19 data, and price information on stocks and cryptocu…☆17Jan 19, 2023Updated 3 years ago
- A curated list of resources dedicated to text summarization☆14Mar 28, 2018Updated 8 years ago
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆14Aug 8, 2022Updated 3 years ago
- Implementation of the CMAC keyed hash function using AES as block cipher.☆16Apr 2, 2025Updated last year
- Nice latex makefile that works out of the box☆13Dec 9, 2019Updated 6 years ago
- Simulate Attacks With Mininet And Hping3☆16Jul 1, 2021Updated 4 years ago
- ☆15Feb 2, 2026Updated 3 months ago
- Secure-D Web Application Security Test Checklist summarizes well-known weaknesses, vulnerabilities and best practices into review topics …☆21Sep 21, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This is CryptoByte a cryptocurrency android application that displays market price listing based on trade volume and market capitaliza…☆18May 26, 2021Updated 4 years ago
- Payloads for the Hak5 Bash Bunny☆13May 23, 2019Updated 6 years ago
- AVX512 population count routines☆23Aug 2, 2019Updated 6 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆16Nov 11, 2020Updated 5 years ago
- Beamer theme with nice tricks for fullscreen pictures & videos☆12Apr 19, 2021Updated 5 years ago
- Documentation for #botkit☆19Apr 11, 2022Updated 4 years ago
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago