• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Authentication Methods

Results for "authentication methods"


  • P

    Packt

    Intro to IoT Pentesting

    Skills you'll gain: Open Web Application Security Project (OWASP), Exploit development, Exploitation techniques, Internet Of Things, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Test Tools, USB, Embedded Systems, Network Security, Test Equipment, General Networking, Serial Peripheral Interface

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Security and Troubleshooting Essentials

    Skills you'll gain: Hardware Troubleshooting, Computer Security Awareness Training, Information Systems Security, Malware Protection, Data Security, Technical Support and Services, Encryption, Security Awareness, Authentications, Patch Management, Technical Support, Firewall, Data Integrity

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Network Security, Automation, and Exam Preparation

    Skills you'll gain: Network Security, Network Administration, Infrastructure Security, Ansible, Information Systems Security, Firewall, Security Controls, Wireless Networks, Network Monitoring, Computer Networking, Software-Defined Networking, Identity and Access Management, Authorization (Computing), Scripting, Authentications, Automation, Encryption

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Certified Vault Operations Professional – A Complete Guide

    Skills you'll gain: Event Monitoring, Cloud Security, Security Management, Data Management, Performance Testing, System Configuration, Servers, Scenario Testing

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Comprehensive Cisco Security Techniques and Automation

    Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Network Security, Information Systems Security, Patch Management, Network Monitoring, Data Security, Malware Protection, Mobile Security, Authorization (Computing), Identity and Access Management

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Cloud Security Risks: Identify and Protect Against Threats

    Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    44 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Security and Auditing in Ethereum

    Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Security, Development Testing, Authorization (Computing), Data Validation

    4.8
    Rating, 4.8 out of 5 stars
    ·
    30 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    S

    SkillUp

    Authorization and Managing Identity in Azure

    Skills you'll gain: Microsoft Azure, Role-Based Access Control (RBAC), Azure Active Directory, Authorization (Computing), Authentications, Identity and Access Management, Cloud Infrastructure, Cloud Computing, Cloud Security, Single Sign-On (SSO), Kubernetes, Encryption, Multi-Factor Authentication, Data Integration

    5
    Rating, 5 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Data Mining Methods

    Skills you'll gain: Data Mining, Unsupervised Learning, Big Data, Supervised Learning, Machine Learning Methods, Classification And Regression Tree (CART), Data Analysis, Anomaly Detection, Machine Learning Algorithms, Advanced Analytics, Statistical Analysis, Predictive Modeling, Network Analysis, Exploratory Data Analysis, Bayesian Statistics, Algorithms, Artificial Neural Networks, Scalability

    Build toward a degree

    4.4
    Rating, 4.4 out of 5 stars
    ·
    66 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Intermediate Ethical Hacking Techniques

    Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Command-Line Interface, Software Installation, Virtual Machines, SQL

    4.1
    Rating, 4.1 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    W

    Whizlabs

    Design Security Ops, Identity, and Compliance capabilities

    Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), Security Controls, Multi-Factor Authentication, Authorization (Computing), Authentications, Continuous Monitoring, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    176 reviews

    Intermediate · Course · 1 - 4 Weeks

1…567…269

In summary, here are 10 of our most popular authentication methods courses

  • Intro to IoT Pentesting: Packt
  • Security and Troubleshooting Essentials: Packt
  • Network Security, Automation, and Exam Preparation: Packt
  • Certified Vault Operations Professional – A Complete Guide: Packt
  • Comprehensive Cisco Security Techniques and Automation: Packt
  • Cloud Security Risks: Identify and Protect Against Threats: Google Cloud
  • Security and Auditing in Ethereum: EDUCBA
  • Authorization and Managing Identity in Azure: SkillUp
  • Data Mining Methods: University of Colorado Boulder
  • Intermediate Ethical Hacking Techniques: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok