• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Encryption Techniques

Results for "encryption techniques"


  • U

    University of Colorado System

    Applied Cryptography

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

    ★ 4.6 (918) · Intermediate · Specialization · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado System

    Introduction to Applied Cryptography

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

    ★ 4.6 (1K) · Beginner · Specialization · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    IBM

    Encryption and Cryptography Essentials

    Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity

    ★ 5 (46) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • S

    Starweaver

    Advanced Threat Intelligence Techniques

    Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, Threat Management, AI Security, Responsible AI, Malware Protection, Cybersecurity, Requirements Analysis, Technical Communication

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • U

    University of Colorado System

    Symmetric Cryptography

    Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Brute-force attacks, Algorithms

    ★ 4.5 (284) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    TLS & HTTPS Explained – Visualizations & Localhost Setup

    Skills you'll gain: Network Security, Data Security, Emerging Technologies, Quantum computing

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Category: Credit offered
    Credit offered

What brings you to Coursera today?

  • G

    Google

    IT Security: Defense against the digital dark arts

    Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols

    ★ 4.8 (26K) · Beginner · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of California, Davis

    Secure Coding Practices

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Security Testing, Application Security, Software Design, C and C++, Linux Administration, System Design and Implementation, Java, Programming Principles, Cybersecurity

    ★ 4.5 (607) · Intermediate · Specialization · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    EDUCBA

    Python Hacking & Cryptography Mastery

    Skills you'll gain: Cryptography, Encryption, Cybersecurity, Brute-force attacks, Python Programming, Key Management, Programming Principles, File I/O, Computational Logic, Program Development, Algorithms, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components, Data Structures, Application Development

    ★ 4.9 (14) · Beginner · Specialization · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    IBM

    Penetration Testing, Threat Hunting, and Cryptography

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

    ★ 4.6 (2.5K) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    ISC2

    Cryptography

    Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms

    ★ 4.8 (95) · Beginner · Course · 1 - 4 Weeks

    Category: Credit offered
    Credit offered
  • S

    SkillUp

    Data Privacy, Security, Governance, Risk and Compliance

    Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Data Management, Computer Security Incident Management, Security Strategy, Threat Management, Threat Detection, Law, Regulation, and Compliance, Data Infrastructure, Risk Management, Cybersecurity, Compliance Management, Encryption, Incident Management

    ★ 4.2 (42) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1234…477

In summary, here are 10 of our most popular encryption techniques courses

  • Applied Cryptography: University of Colorado System
  • Introduction to Applied Cryptography: University of Colorado System
  • Encryption and Cryptography Essentials: IBM
  • Advanced Threat Intelligence Techniques: Starweaver
  • Symmetric Cryptography: University of Colorado System
  • TLS & HTTPS Explained – Visualizations & Localhost Setup: Packt
  • IT Security: Defense against the digital dark arts : Google
  • Secure Coding Practices: University of California, Davis
  • Python Hacking & Cryptography Mastery: EDUCBA
  • Penetration Testing, Threat Hunting, and Cryptography: IBM

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok