Filter by
The language used throughout the course, in both instruction and assessments.
64 results for "cryptography and information theory"
Skills you'll gain: Computer Security Incident Management, Risk Management, Leadership and Management, Network Security, Cryptography, Cyberattacks
University System of Georgia
Skills you'll gain: Security Engineering, System Security, Risk Management, Computer Security Incident Management, Leadership and Management, Security Strategy, Network Security, Strategy, Cyberattacks, Strategy and Operations, Computer Security Models, Software Security, Security Software, Computer Networking, Planning, Business Analysis, Network Architecture, Operating Systems, Networking Hardware, Operations Management, Cryptography, Network Model, Project Management, Systems Design
Palo Alto Networks
Skills you'll gain: Network Security, Security Engineering, Computer Networking, System Security, Software Security, Network Architecture, Cloud Computing, Computer Security Models, Strategy and Operations, Computer Security Incident Management, Operations Management, Security Software, Cyberattacks, Network Model, Security Strategy, Software As A Service, Cloud Applications, Cloud Infrastructure, Leadership and Management, Networking Hardware, Strategy, Cloud Management, Cloud Standards, Software-Defined Networking
University of London
Skills you'll gain: Computer Security Incident Management, Computer Security Models, Cryptography, Leadership and Management, Mobile Security, Risk Management, Security Engineering, System Security
University of Colorado System
Skills you'll gain: Software Engineering, Design and Product, Software Architecture, Product Design, Security Software, Security Engineering, Software Security, Software Testing, Databases, Systems Design, Agile Software Development, Database Design, Theoretical Computer Science, BlockChain, Computer Programming, Cryptography, Operating Systems, Software Engineering Tools, User Experience
University System of Georgia
Skills you'll gain: Network Security, Security Engineering, System Security, Computer Security Incident Management, Computer Security Models, Software Security, Cryptography, Risk Management, Security Software, Security Strategy
Google Cloud
Skills you'll gain: Cloud Computing, Google Cloud Platform
University of Michigan
Skills you'll gain: Communication, Computer Networking, Network Architecture, Network Security, Networking Hardware, Network Model, Theoretical Computer Science, Cryptography, Computer Security Models, System Security
Institut Mines-Télécom
Skills you'll gain: Leadership and Management, Business Analysis, Decision Making, Business Development, Business Psychology, Data Analysis, Design and Product, Planning, Strategy, Strategy and Operations, BlockChain
New York University
Skills you'll gain: Computer Security Models, Cryptography, Cyberattacks, Security Engineering, Security Software, Algorithms, Computational Thinking, Network Security, Security Strategy, System Security
EIT Digital
Skills you'll gain: Big Data, Computer Security Incident Management, Data Management, Network Security, Security Engineering, Security Strategy, Software Security, System Security, Computer Security Models, Cyberattacks
In summary, here are 10 of our most popular cryptography and information theory courses
- Certified in Cybersecurity:Â ISC2
- Managing Cybersecurity:Â University System of Georgia
- Palo Alto Networks Cybersecurity:Â Palo Alto Networks
- Cyber Security Fundamentals:Â University of London
- Secure Software Design:Â University of Colorado System
- Cybersecurity and Its Ten Domains:Â University System of Georgia
- Security in Google Cloud en Français: Google Cloud
- Internet History, Technology, and Security:Â University of Michigan
- Blockchain : enjeux et mécanismes cryptographiques: Institut Mines-Télécom
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft