• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Computer Science Comparison Of Tls Implementations

Results for "computer science comparison of tls implementations"


  • Status: New
    New
    B

    Birla Institute of Technology & Science, Pilani

    TCP/IP and Internet

    Skills you'll gain: TCP/IP, Network Protocols, Network Security, Network Infrastructure, OSI Models, Network Architecture, Routing Protocols, Wireless Networks, Computer Networking, Network Routing, Network Performance Management, Application Security, Network Model, Software-Defined Networking, Computer Security Awareness Training

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    B

    Birla Institute of Technology & Science, Pilani

    Network Programming and Client-Server Programming

    Skills you'll gain: Web Servers, Distributed Computing, Network Troubleshooting, Servers, Network Architecture, System Programming, Network Protocols, Systems Architecture, TCP/IP, Computer Networking, Network Performance Management, Scalability, File Transfer Protocol (FTP), System Design and Implementation, Web Services, Microservices, Debugging, OS Process Management, Software Development, Application Programming Interface (API)

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Peking University

    程序设计与算法

    Skills you'll gain: Data Structures, Algorithms, C++ (Programming Language), Object Oriented Programming (OOP), Computational Thinking, C (Programming Language), Graph Theory, Programming Principles, Computer Programming, Theoretical Computer Science, Pseudocode, Computer Science, Program Development, Data Storage, Software Design, Computer Architecture, Database Systems, Performance Tuning, Computational Logic, Maintainability

    4.8
    Rating, 4.8 out of 5 stars
    ·
    2.7K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Python for Cybersecurity

    Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Exploit development, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Persistence, Python Programming, Data Access, Computer Programming

    4.5
    Rating, 4.5 out of 5 stars
    ·
    539 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Writing Secure Code in C++

    Skills you'll gain: Secure Coding, Application Security, Computer Programming Tools, System Programming, C++ (Programming Language), C (Programming Language), Software Development Tools, Exploit development, Debugging, Programming Principles, Embedded Systems, Interoperability, Unix, Vulnerability Assessments, Unix Commands, Operating Systems, Data Security, Linux, Microsoft Windows, Data Validation

    2.8
    Rating, 2.8 out of 5 stars
    ·
    33 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Advanced Data Structures, RSA and Quantum Algorithms

    Skills you'll gain: Public Key Cryptography Standards (PKCS), Cryptography, Data Structures, Algorithms, Encryption, Theoretical Computer Science, Computer Science, Computational Thinking, Data Storage Technologies, Linear Algebra, Python Programming, Arithmetic

    Build toward a degree

    4.6
    Rating, 4.6 out of 5 stars
    ·
    41 reviews

    Advanced · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Symmetric Cryptography

    Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Algorithms

    4.5
    Rating, 4.5 out of 5 stars
    ·
    277 reviews

    Intermediate · Course · 1 - 3 Months

  • U

    University of Maryland, College Park

    Cryptography

    Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Digital Communications, Authentications, Data Integrity, Algorithms, Computer Science

    4.6
    Rating, 4.6 out of 5 stars
    ·
    1.3K reviews

    Mixed · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Fundamentals of Network Communication

    Skills you'll gain: Digital Communications, OSI Models, Network Protocols, TCP/IP, Communication Systems, Network Routing, Network Architecture, Network Planning And Design, General Networking, Computer Networking, System Programming, Data Integrity

    4.6
    Rating, 4.6 out of 5 stars
    ·
    2.4K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Network Implementations and Operations

    Skills you'll gain: Network Security, Disaster Recovery, Network Administration, Authentications, Vulnerability Assessments, Computer Networking, Network Infrastructure, Wireless Networks, Cybersecurity, Network Monitoring, Local Area Networks, Vulnerability Management, Telecommunications, Network Protocols, Network Switches, Network Routing, Communication Systems, Cryptography, Encryption

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Asymmetric Cryptography and Key Management

    Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms

    4.7
    Rating, 4.7 out of 5 stars
    ·
    280 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Cryptography: Learn Public Key Infrastructure from Scratch

    Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Windows Servers, Web Servers, Active Directory, Network Infrastructure, Authentications, Cybersecurity, Server Administration, Data Encryption Standard

    Intermediate · Course · 1 - 3 Months

1234…834

In summary, here are 10 of our most popular computer science comparison of tls implementations courses

  • TCP/IP and Internet : Birla Institute of Technology & Science, Pilani
  • Network Programming and Client-Server Programming: Birla Institute of Technology & Science, Pilani
  • 程序设计与算法: Peking University
  • Python for Cybersecurity: Infosec
  • Writing Secure Code in C++: Infosec
  • Advanced Data Structures, RSA and Quantum Algorithms: University of Colorado Boulder
  • Symmetric Cryptography: University of Colorado System
  • Cryptography: University of Maryland, College Park
  • Fundamentals of Network Communication: University of Colorado System
  • Network Implementations and Operations: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok