• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Authenticated Encryption

Results for "authenticated encryption"


  • Status: New
    New
    G

    Google Cloud

    Desenvolvimento de Aplicativos com o Cloud Run Functions

    Skills you'll gain: Identity and Access Management, Serverless Computing, Cloud Applications, Google Cloud Platform, Cloud-Based Integration, Cloud Development, Cloud Security, Security Controls, Cloud Deployment, Authorization (Computing), Role-Based Access Control (RBAC), Data Security, Authentications, Operational Databases, Key Management, Encryption, Databases, Application Deployment, Event-Driven Programming, Scalability

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cryptographic Hash and Integrity Protection

    Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Key Management, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    99 reviews

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Digital Identity & Security – Introduction to PKI

    Skills you'll gain: Key Management, Network Security, Digital Communications

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    G

    Google Cloud

    Développer des applications avec Cloud Run Functions sur GC

    Skills you'll gain: Identity and Access Management, Serverless Computing, Google Cloud Platform, Cloud Development, Cloud Applications, Cloud API, Cloud Security, Cloud Deployment, Cloud-Native Computing, Cloud Services, Cloud-Based Integration, Authorization (Computing), Authentications, Security Controls, Application Deployment, Operational Databases, Event-Driven Programming, Encryption

    Intermediate · Course · 1 - 3 Months

  • I

    ISC2

    Systems and Application Security

    Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Infrastructure Security, Cloud Deployment, Cloud Computing, Threat Detection, Cyber Attacks, Endpoint Detection and Response, Cybersecurity, Information Systems Security, Virtualization, Virtualization and Virtual Machines, Virtual Machines, Security Controls, Intrusion Detection and Prevention, Data Security, Human Factors (Security)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    34 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cryptography and Information Theory

    Skills you'll gain: Cryptography, Brute-force attacks, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Information Assurance, Theoretical Computer Science, Threat Modeling, Communication Systems

    4.5
    Rating, 4.5 out of 5 stars
    ·
    550 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Applied Cryptography

    Skills you'll gain: Cryptography, Encryption, Network Security, Cybersecurity, Key Management, Security Engineering, Network Protocols, Federated Learning, Data Integrity, Security Management

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    2

    28DIGITAL

    Security and Privacy for Big Data - Part 1

    Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Controls, Cryptographic Protocols, Security Management, Data Access, Vulnerability Assessments, Encryption, Vulnerability Management, Big Data, Authorization (Computing), Identity and Access Management, Cyber Risk

    4.7
    Rating, 4.7 out of 5 stars
    ·
    587 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Deploy Vector DBs Securely

    Skills you'll gain: Vector Databases, Grafana, Containerization, Role-Based Access Control (RBAC), Docker (Software), MLOps (Machine Learning Operations), Application Deployment, AI Security, Enterprise Security, Scalability, Data Access, Authorization (Computing), Dashboard Creation, Encryption, Cryptographic Protocols, Performance Tuning, System Monitoring, Infrastructure Security, Continuous Monitoring

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    IBM

    Penetration Testing, Threat Hunting, and Cryptography

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    2.5K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Security Best Practices in Google Cloud

    Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Authentications, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Web Applications, Vulnerability Scanning, Encryption, Key Management, Virtual Machines

    4.7
    Rating, 4.7 out of 5 stars
    ·
    351 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    L

    LearnKartS

    Node.js & Express.js Foundations

    Skills you'll gain: Node.JS, Authentications, Middleware, Server Side, Back-End Web Development, MongoDB, Authorization (Computing), Secure Coding, Web Development, JSON, Encryption, JavaScript Frameworks, Model View Controller, Web Frameworks, Web Applications, Restful API, User Accounts, MySQL, Javascript, TypeScript

    Beginner · Course · 1 - 3 Months

1234…40

In summary, here are 10 of our most popular authenticated encryption courses

  • Desenvolvimento de Aplicativos com o Cloud Run Functions: Google Cloud
  • Cryptographic Hash and Integrity Protection: University of Colorado System
  • Digital Identity & Security – Introduction to PKI: Packt
  • Développer des applications avec Cloud Run Functions sur GC: Google Cloud
  • Systems and Application Security: ISC2
  • Cryptography and Information Theory: University of Colorado System
  • Cyber Security: Applied Cryptography: Macquarie University
  • Security and Privacy for Big Data - Part 1: 28DIGITAL
  • Deploy Vector DBs Securely: Coursera
  • Penetration Testing, Threat Hunting, and Cryptography: IBM

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok