• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Symmetric Cryptography

Results for "symmetric cryptography"


  • Status: Free Trial
    Free Trial
    G

    Google

    Assets, Threats, and Vulnerabilities

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography

    4.8
    Rating, 4.8 out of 5 stars
    ·
    4K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free
    Free
    I

    Infosec

    CompTIA Security+ 701

    Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Security Management, Network Security, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Personally Identifiable Information, Data Governance, Firewall, Vulnerability Assessments, User Accounts, Authorization (Computing), Risk Management

    4.5
    Rating, 4.5 out of 5 stars
    ·
    519 reviews

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    G

    Google

    IT Security: Defense against the digital dark arts

    Skills you'll gain: IT Security Architecture, Network Security, Computer Security, Application Security, Security Controls, Security Awareness, Cybersecurity, Cyber Attacks, Encryption, Data Security, Cryptography, Security Management, Authorization (Computing), Threat Management, Firewall, Network Administration, Authentications, Threat Detection, Hardening, Malware Protection

    4.8
    Rating, 4.8 out of 5 stars
    ·
    26K reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    E

    EIT Digital

    Security and Privacy for Big Data - Part 1

    Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Security Requirements Analysis, Data Access, Vulnerability Assessments, Data Management, Information Management, Big Data

    4.7
    Rating, 4.7 out of 5 stars
    ·
    585 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Cybersecurity Operations Fundamentals

    Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Operating System Administration, Vulnerability Assessments, Encryption, Threat Detection, Cybersecurity

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.2K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Classical Cryptosystems and Core Concepts

    Skills you'll gain: Cryptography, Cybersecurity, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Data Integrity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    421 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free
    Free
    A

    Amazon Web Services

    AWS Security – Encryption Fundamentals

    Skills you'll gain: Cloud Security, Encryption, Amazon Web Services, AWS Identity and Access Management (IAM), Amazon S3, Data Security, Cryptography, Personally Identifiable Information

    4.9
    Rating, 4.9 out of 5 stars
    ·
    39 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    N

    New York University

    Cyber Attack Countermeasures

    Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication

    4.8
    Rating, 4.8 out of 5 stars
    ·
    708 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California San Diego

    Number Theory and Cryptography

    Skills you'll gain: Cryptographic Protocols, Cryptography, Key Management, Encryption, Public Key Cryptography Standards (PKCS), Arithmetic, Algorithms, Theoretical Computer Science, Computational Thinking, Algebra, Python Programming

    4.5
    Rating, 4.5 out of 5 stars
    ·
    608 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    (SSCP) Systems Security Certified Practitioner

    Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Investigation, Security Controls, Security Strategy, Risk Analysis

    Beginner · Specialization · 1 - 3 Months

  • Status: Preview
    Preview
    U

    University of Leeds

    An Introduction to Cryptography

    Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security

    4.4
    Rating, 4.4 out of 5 stars
    ·
    14 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cryptographic Hash and Integrity Protection

    Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    92 reviews

    Intermediate · Course · 1 - 4 Weeks

Searches related to symmetric cryptography

asymmetric cryptography and key management
1…456…31

In summary, here are 10 of our most popular symmetric cryptography courses

  • Assets, Threats, and Vulnerabilities: Google
  • CompTIA Security+ 701: Infosec
  • IT Security: Defense against the digital dark arts : Google
  • Security and Privacy for Big Data - Part 1: EIT Digital
  • Cybersecurity Operations Fundamentals: Cisco Learning and Certifications
  • Classical Cryptosystems and Core Concepts: University of Colorado System
  • AWS Security – Encryption Fundamentals: Amazon Web Services
  • Cyber Attack Countermeasures: New York University
  • Number Theory and Cryptography: University of California San Diego
  • (SSCP) Systems Security Certified Practitioner: Pearson

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok