• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Symmetric Cryptography

Results for "symmetric cryptography"


  • Status: Free Trial
    Free Trial
    U

    University of California San Diego

    Introduction to Discrete Mathematics for Computer Science

    Skills you'll gain: Graph Theory, Logical Reasoning, Cryptographic Protocols, Combinatorics, Computational Logic, Deductive Reasoning, Cryptography, Probability, Key Management, Computational Thinking, Encryption, Probability Distribution, Network Analysis, Public Key Cryptography Standards (PKCS), Theoretical Computer Science, Bayesian Statistics, Python Programming, Data Structures, Algorithms, Arithmetic

    4.5
    Rating, 4.5 out of 5 stars
    ·
    3.7K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Penetration Testing and Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)

    3.6
    Rating, 3.6 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Ethical Hacking with Metasploit, SQL & Crypto

    Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface

    Mixed · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    B

    Ball State University

    Cybersecurity and Secure Software Design

    Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity

    Build toward a degree

    5
    Rating, 5 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Systems Security Certified Practitioner

    Skills you'll gain: Risk Analysis, Risk Management, Cybersecurity, Network Security, Incident Response, Cloud Security, Risk Management Framework, Authentications, Business Continuity Planning, Application Security, IT Management, Security Management, Threat Modeling, Threat Management, OSI Models, Disaster Recovery, Cryptography, Encryption, Cyber Risk, Vulnerability Assessments

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Basic Cryptography and Programming with Crypto API

    Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Application Security, Public Key Cryptography Standards (PKCS), Secure Coding, Data Security, Web Development, Email Security, PHP (Scripting Language), Algorithms, User Provisioning

    4.5
    Rating, 4.5 out of 5 stars
    ·
    100 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    Networking and Security in iOS Applications

    Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Cryptography

    4.5
    Rating, 4.5 out of 5 stars
    ·
    255 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    The Blockchain

    Skills you'll gain: Blockchain, FinTech, Cryptography, Distributed Computing, Transaction Processing, Payment Systems, Emerging Technologies, Digital Assets, Software Systems, Computer Systems, Software Architecture, Data Integrity, Network Analysis

    4.2
    Rating, 4.2 out of 5 stars
    ·
    176 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Cryptography, Network Security, and Application Security

    Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, OSI Models, Cryptography, Encryption, Endpoint Security, Firewall, Malware Protection, Wireless Networks, Network Protocols, Public Key Infrastructure, Data Integrity, Virtualization

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 7

    Skills you'll gain: Cryptography, Encryption, Cloud Security, Cyber Security Assessment, Data Encryption Standard, Cloud Computing, Advanced Encryption Standard (AES), Data Security, Key Management, Public Key Infrastructure

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    (SSCP) Systems Security Certified Practitioner: Unit 2

    Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Information Systems Security, Key Management, Network Security, Information Privacy, Authentications, Digital Communications

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    S

    SkillUp

    Blockchain and Cryptography Overview

    Skills you'll gain: Blockchain, Cryptography, Cybersecurity, Network Security, Information Systems Security, Key Management, Encryption, Data Integrity, Distributed Computing, Transaction Processing, Algorithms

    Beginner · Course · 1 - 4 Weeks

Searches related to symmetric cryptography

asymmetric cryptography and key management
1…567…31

In summary, here are 10 of our most popular symmetric cryptography courses

  • Introduction to Discrete Mathematics for Computer Science: University of California San Diego
  • Introduction to Penetration Testing and Ethical Hacking: Johns Hopkins University
  • Ethical Hacking with Metasploit, SQL & Crypto: EDUCBA
  • Cybersecurity and Secure Software Design: Ball State University
  • Systems Security Certified Practitioner: Packt
  • Basic Cryptography and Programming with Crypto API: University of Colorado System
  • Networking and Security in iOS Applications: University of California, Irvine
  • The Blockchain: University of California, Irvine
  • Cryptography, Network Security, and Application Security: Packt
  • Certified Ethical Hacker (CEH): Unit 7: Pearson

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok