• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Secure Protocols

Results for "secure protocols"


  • Status: Free Trial
    Free Trial
    2

    28DIGITAL

    Development of Secure Embedded Systems

    Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Embedded Software, Internet Of Things, Operating Systems, Security Requirements Analysis, Network Architecture, Network Security, Cybersecurity, Web Services, Programming Principles, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), Wireless Networks, System Programming, Computer Programming, System Requirements, Simple Object Access Protocol (SOAP), Software Engineering

    4.3
    Rating, 4.3 out of 5 stars
    ·
    1.2K reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Requirements Engineering: Secure Software Specifications

    Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Security Requirements Analysis, Mockups, Interviewing Skills, User Requirements Documents, Data Flow Diagrams (DFDs), Storyboarding, Requirements Management, Functional Requirement, Goal Setting, Software Development Methodologies, Software Documentation, Diagram Design, Agile Methodology, Business Requirements, Unified Modeling Language, Risk Management Framework, System Requirements

    4.5
    Rating, 4.5 out of 5 stars
    ·
    854 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    P

    Packt

    Cybersecurity Essentials - From Zero to Secure

    Skills you'll gain: Cybersecurity, Endpoint Security, Network Security, Cyber Attacks, Encryption, Information Systems Security, Application Security, Cyber Security Policies, Penetration Testing, Data Security, Computer Security Awareness Training, Firewall, Cryptography, Security Controls, Threat Modeling, Intrusion Detection and Prevention, Security Awareness, Mobile Security, Malware Protection, Authentications

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Secure Your Data at Rest

    Skills you'll gain: Data Security, Cloud Security, Azure Active Directory, Microsoft Azure, Data Storage, Encryption, Cloud Storage, Authorization (Computing), Authentications, Database Management, Data Governance, Key Management, Identity and Access Management, Firewall, Threat Detection

    4.5
    Rating, 4.5 out of 5 stars
    ·
    15 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Design & Secure LLM APIs for Scalability

    Skills you'll gain: API Design, Cloud API, Amazon CloudWatch, AI Security, Cloud Management, Security Controls, Application Performance Management, Redis, Load Balancing, Performance Testing, Network Monitoring, Incident Response, MLOps (Machine Learning Operations), GitHub, Python Programming, Machine Learning

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Writing Secure Code in C++

    Skills you'll gain: Secure Coding, Computer Programming Tools, C and C++, Application Security, System Programming, C++ (Programming Language), C (Programming Language), Software Development Tools, Exploit development, Debugging, Interoperability, Unix, Embedded Systems, Vulnerability Assessments, Unix Commands, File I/O, Operating Systems, Data Security, Linux, Microsoft Windows

    2.8
    Rating, 2.8 out of 5 stars
    ·
    33 reviews

    Intermediate · Specialization · 3 - 6 Months

  • P

    Packt

    Cyber Secure Coder (CSC-110)

    Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Secure Patient Data: Medical Office Management

    Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Medical Office Procedures, Data Management, Medical Records, Personally Identifiable Information, Data Security, Document Management, Security Controls, Information Privacy, Records Management, Taxonomy, Regulatory Compliance, Information Assurance, Encryption, Risk Analysis, Process Mapping

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    E

    EC-Council

    Secure Full Stack MEAN Developer

    Skills you'll gain: Node.JS, MongoDB, Angular, Full-Stack Web Development, JavaScript Frameworks, Restful API, Web Applications, Web Development, NoSQL, Front-End Web Development, Application Security, Web Development Tools, Application Programming Interface (API), API Design, Javascript, Database Management, Back-End Web Development, Servers, Middleware

    4.6
    Rating, 4.6 out of 5 stars
    ·
    91 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Harden AI: Secure Your ML Pipelines

    Skills you'll gain: AI Security, Vulnerability Scanning, Hardening, DevSecOps, Vulnerability Assessments, Responsible AI, Identity and Access Management, MLOps (Machine Learning Operations), Infrastructure Security, Security Controls, Threat Modeling, Model Deployment, Model Evaluation, CI/CD, Continuous Monitoring, AI Personalization, Resilience, Compliance Management, Containerization, Engineering

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Test and Secure Your AI Code

    Skills you'll gain: AI Security, Test Driven Development (TDD), Vulnerability Assessments, Unit Testing, Code Coverage, Vulnerability Scanning, Continuous Integration, Dependency Analysis, Secure Coding, CI/CD, Software Testing, Test Automation, Integration Testing, Continuous Deployment, Software Versioning, Large Language Modeling

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Secure AI Systems Across Lifecycle Stages

    Skills you'll gain: AI Security, Threat Modeling, MITRE ATT&CK Framework, Security Controls, Responsible AI, MLOps (Machine Learning Operations), Secure Coding, Security Testing, Cybersecurity, Model Deployment, Data Security, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Assessments, Application Lifecycle Management

    Intermediate · Course · 1 - 4 Weeks

1…101112…166

In summary, here are 10 of our most popular secure protocols courses

  • Development of Secure Embedded Systems: 28DIGITAL
  • Requirements Engineering: Secure Software Specifications: University of Colorado System
  • Cybersecurity Essentials - From Zero to Secure: Packt
  • Secure Your Data at Rest: Microsoft
  • Design & Secure LLM APIs for Scalability: Coursera
  • Writing Secure Code in C++: Infosec
  • Cyber Secure Coder (CSC-110) : Packt
  • Secure Patient Data: Medical Office Management: Coursera
  • Secure Full Stack MEAN Developer: EC-Council
  • Harden AI: Secure Your ML Pipelines: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok