• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Authentications

Results for "authentications"


  • G

    Google Cloud

    Gérer des charges de travail évolutives dans GKE

    Skills you'll gain: Kubernetes, Google Cloud Platform, Istio, Cloud-Native Computing, Multi-Cloud, CI/CD, Identity and Access Management, Scalability, AI Workflows, Cloud Deployment, Authentications, Microservices, Configuration Management, Cloud Security, Software Configuration Management, Authorization (Computing), Security Controls

    Advanced · Course · 3 - 6 Months

  • I

    ISC2

    ISC2 Systems Security Certified Practitioner (SSCP)

    Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Cryptographic Protocols, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Security Management, Vulnerability Assessments, Risk Management, Network Security, Application Security, Asset Management, Cloud Security, OSI Models

    ★ 4.7 (303) · Beginner · Specialization · 1 - 3 Months

  • M

    Microsoft

    Cybersecurity and Privacy

    Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Security Controls, Multi-Factor Authentication, Authentications, Information Systems Security, Desktop Support, Cyber Security Policies, Network Security, Technical Support and Services, Application Security, Data Security, Information Privacy, Cloud Computing Architecture, Cyber Security Strategy, Servers, Server Side, Cloud Computing, Network Performance Management, Remote Access Systems

    ★ 4.9 (149) · Beginner · Course · 1 - 4 Weeks

  • U

    University of Colorado System

    Cybersecurity for Business

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Risk Analysis, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Data Security, Authentications, Security Testing, Cloud Security, Security Strategy, Threat Management, Endpoint Detection and Response, Incident Management, Risk Management, Cyber Attacks

    ★ 4.7 (1.9K) · Beginner · Specialization · 3 - 6 Months

  • M

    Meta

    APIs

    Skills you'll gain: Restful API, API Testing, Django (Web Framework), API Design, Software Documentation, Application Programming Interface (API), Authentications, Authorization (Computing), Debugging, JSON, Performance Tuning, Data Validation, Extensible Markup Language (XML)

    ★ 4.4 (382) · Intermediate · Course · 1 - 4 Weeks

  • U

    University of Colorado System

    Introduction to Cybersecurity for Business

    Skills you'll gain: Risk Analysis, Cybersecurity, Risk Management, Cyber Attacks, Cryptographic Protocols, Cyber Security Assessment, Vulnerability Assessments, Encryption, Network Security, Data Security, Cryptography, Security Awareness, Information Assurance, Public Key Infrastructure, Authentications, Data Integrity, Network Protocols

    ★ 4.7 (1.1K) · Beginner · Course · 1 - 3 Months

  • G

    Google Cloud

    API Security on Google Cloud's Apigee API Platform

    Skills you'll gain: OAuth, Cloud API, Application Programming Interface (API), API Design, Restful API, Authentications, Authorization (Computing), Security Controls, Application Security, Data Security, JSON, Identity and Access Management, Cryptographic Protocols, Threat Management

    ★ 4.6 (841) · Beginner · Course · 1 - 4 Weeks

  • M

    Meta

    Back-End Developer Capstone

    Skills you'll gain: Back-End Web Development, Django (Web Framework), Version Control, Git (Version Control System), API Testing, Web Development, Authentications, API Design, Application Development, Application Programming Interface (API), Restful API, Unit Testing, Test Tools, Database Development, MySQL, User Accounts, Web Applications, Databases

    ★ 4.6 (181) · Intermediate · Course · 1 - 4 Weeks

  • U

    University of California, Davis

    Secure Coding Practices

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Security Testing, Application Security, Software Design, C and C++, Linux Administration, System Design and Implementation, Java, Programming Principles, Cybersecurity

    ★ 4.5 (609) · Intermediate · Specialization · 3 - 6 Months

  • I

    IBM

    Cybersecurity Architecture

    Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Data Security, Network Architecture, Application Security, Information Technology Architecture

    ★ 4.8 (199) · Intermediate · Course · 1 - 3 Months

  • I

    IBM

    Django Application Development with SQL and Databases

    Skills you'll gain: Django (Web Framework), Object-Relational Mapping, Database Application, SQL, Cloud Deployment, Bootstrap (Front-End Framework), Relational Databases, Database Management, Database Design, Full-Stack Web Development, Databases, Database Management Systems, Cloud Applications, Web Applications, Application Deployment, Authentications, UI Components, Model View Controller, Application Development, Query Languages

    ★ 4.6 (356) · Intermediate · Course · 1 - 3 Months

  • P

    Palo Alto Networks

    Palo Alto Networks Cybersecurity Foundation

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, IT Security Architecture, Firewall, Computer Security, AI Security, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Architecture Review, Exploitation techniques, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications

    ★ 4.6 (560) · Intermediate · Course · 1 - 3 Months

1…141516…63

In summary, here are 10 of our most popular authentications courses

  • Gérer des charges de travail évolutives dans GKE: Google Cloud
  • ISC2 Systems Security Certified Practitioner (SSCP): ISC2
  • Cybersecurity and Privacy: Microsoft
  • Cybersecurity for Business: University of Colorado System
  • APIs: Meta
  • Introduction to Cybersecurity for Business: University of Colorado System
  • API Security on Google Cloud's Apigee API Platform: Google Cloud
  • Back-End Developer Capstone : Meta
  • Secure Coding Practices: University of California, Davis
  • Cybersecurity Architecture: IBM

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications
  • Share your Coursera learning story

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Udemy

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok