Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a decision tree for post-quantum cryptography, simplifying algorithm selection for quantum-ready organizations. Gain insights from experts on navigating PQC complexities.
Explore quantum-safe hybrid certificates for document signing, enhancing security in digital services and electronic signatures with PAdES standards.
Explore quantum computing threats to blockchain security and practical implementations of post-quantum cryptography for quantum-safe blockchain networks.
Explore symmetric encryption's role in post-quantum security and its potential to protect existing asymmetric implementations against quantum threats.
Explore diverse PKI deployments, challenges in PQ transition, and flexible migration strategies for X.509 implementations across various network use cases.
Explore quantum security maturity, global approaches, and the need for a common index to improve defenses, measure progress, and prioritize actions in the face of quantum computing threats.
Explore a testbed for evaluating post-quantum algorithms in DNS, addressing challenges and progress in securing this fundamental Internet service.
Explore the pivotal shift to post-quantum encryption, its impact on cybersecurity, and the challenges of implementing post-quantum certificates for the public Web.
Explore sector-based plans for transitioning to Quantum Safe PKIs, including hybrid solutions and governance models for telecom, finance, and public sectors.
Explore quantum-safe transition stages and organizational evolution towards quantum-safe readiness in this research-based presentation on growth models.
Explore the current landscape of post-quantum cryptography validation in FIPS 140-3, including CMVP processes, automation plans, and government requirements for implementation.
Discover how the X9 Financial PKI program enables post-quantum cryptography and crypto-agility in financial services, addressing unique industry requirements and implementation challenges.
Explore the challenges and latest developments in implementing post-quantum certificates for web security, including NIST algorithms, browser adaptations, and practical solutions for WebPKI.
Explore quantum computing's impact on financial security systems and discover practical solutions for protecting institutional communications against emerging quantum threats.
Discover essential strategies for quantum readiness planning, including PQC algorithm implementation, PKI infrastructure adaptation, and practical steps for securing enterprise systems against quantum threats.
Get personalized course recommendations, track subjects and courses with reminders, and more.