• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Secure Protocols

Results for "secure protocols"


  • Status: Free Trial
    Free Trial
    I

    IBM

    Encryption and Cryptography Essentials

    Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity

    5
    Rating, 5 out of 5 stars
    ·
    46 reviews

    Intermediate · Course · 1 - 4 Weeks

  • I

    ISC2

    Network and Communications Security

    Skills you'll gain: OSI Models, Network Security, Security Controls, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Telecommunications, Proxy Servers, Network Infrastructure, System Configuration, Network Architecture, Intrusion Detection and Prevention

    4.5
    Rating, 4.5 out of 5 stars
    ·
    37 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cryptographic Hash and Integrity Protection

    Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Key Management, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    99 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Applied Cryptography

    Skills you'll gain: Cryptography, Encryption, Network Security, Cybersecurity, Key Management, Security Engineering, Network Protocols, Federated Learning, Data Integrity, Security Management

    Beginner · Course · 1 - 3 Months

  • I

    ISC2

    Systems and Application Security

    Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Infrastructure Security, Cloud Deployment, Cloud Computing, Threat Detection, Cyber Attacks, Endpoint Detection and Response, Cybersecurity, Information Systems Security, Virtualization, Virtualization and Virtual Machines, Virtual Machines, Security Controls, Intrusion Detection and Prevention, Data Security, Human Factors (Security)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    34 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Agentic AI Protocols (MCP, A2A, ACP)

    Skills you'll gain: Model Context Protocol, AI Integrations, Performance Tuning

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Mastering Hardware Protocols with ESP32 and Arduinos

    Skills you'll gain: Network Protocols, Communication Systems, Test Equipment, Internet Of Things, Digital Signal Processing, Wireless Networks, Integrated Development Environments, Debugging, Microsoft Visual Studio, Data Analysis Software, Computer Programming Tools, Computational Logic, Digital Analysis, System Configuration, Program Development, Open Source Technology

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    B

    Birla Institute of Technology & Science, Pilani

    TCP/IP and Internet

    Skills you'll gain: TCP/IP, Network Protocols, Network Infrastructure, Network Security, OSI Models, Network Architecture, Routing Protocols, General Networking, Wireless Networks, Computer Networking, Network Administration, Network Routing, Network Performance Management, Network Monitoring, Application Security, Network Model, Live Streaming, Software-Defined Networking, Digital Communications, Computer Security Awareness Training

    Build toward a degree

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Secure Software Design

    Skills you'll gain: Database Design, Software Design, Application Security, User Experience Design, Vulnerability Assessments, Database Theory, Unified Modeling Language, Unit Testing, UI/UX Research, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Data Flow Diagrams (DFDs), Relational Databases, Software Visualization, Security Engineering, Security Software, Systems Development Life Cycle, Software Development Life Cycle

    4.6
    Rating, 4.6 out of 5 stars
    ·
    438 reviews

    Beginner · Specialization · 3 - 6 Months

  • U

    University of Maryland, College Park

    Hardware Security

    Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Hardening, Computer Security, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Security Architecture Review, Application Specific Integrated Circuits, Cryptographic Protocols, Microarchitecture, Cryptography, Systems Design, Encryption, Exploitation techniques, Functional Design, Emerging Technologies

    4.3
    Rating, 4.3 out of 5 stars
    ·
    693 reviews

    Mixed · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    L

    LearnQuest

    Security for Blockchain and DApps

    Skills you'll gain: Blockchain, Key Management, Public Key Infrastructure, Security Controls, Cryptography, Cybersecurity, Data Security, Application Security, Network Security, Security Architecture Review, IT Security Architecture, Vulnerability Assessments, Encryption, Secure Coding, Cryptographic Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Public Key Cryptography Standards (PKCS), Security Testing, Vulnerability Management, Solution Design

    4.6
    Rating, 4.6 out of 5 stars
    ·
    20 reviews

    Intermediate · Specialization · 3 - 6 Months

  • P

    Packt

    Digital Identity & Security – Introduction to PKI

    Skills you'll gain: Key Management, Network Security, Digital Communications

    Beginner · Course · 1 - 4 Weeks

1234…197

In summary, here are 10 of our most popular secure protocols courses

  • Encryption and Cryptography Essentials: IBM
  • Network and Communications Security : ISC2
  • Cryptographic Hash and Integrity Protection: University of Colorado System
  • Cyber Security: Applied Cryptography: Macquarie University
  • Systems and Application Security: ISC2
  • Agentic AI Protocols (MCP, A2A, ACP): Coursera
  • Mastering Hardware Protocols with ESP32 and Arduinos: Packt
  • TCP/IP and Internet : Birla Institute of Technology & Science, Pilani
  • Secure Software Design: University of Colorado System
  • Hardware Security: University of Maryland, College Park

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok