• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Authentication Methods

Results for "authentication methods"


  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Secure Access Control

    Skills you'll gain: Compliance Reporting, Governance, Governance Risk Management and Compliance, Compliance Management, Role-Based Access Control (RBAC), Project Management, Data Governance, Security Controls, Compliance Auditing, Project Management Software, Auditing, Identity and Access Management, User Provisioning

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Fundamentals of Network Security and Cryptography

    Skills you'll gain: Network Security, Network Administration, Cryptography, Firewall, Cryptographic Protocols, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, IT Security Architecture, Cyber Attacks, Security Controls, Public Key Infrastructure, Network Monitoring, Encryption, Network Planning And Design, Human Factors (Security), Local Area Networks, Virtual Local Area Network (VLAN), Network Switches

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Digital Forensics for Pentesters - Hands-On Learning

    Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Protocols, Network Analysis, Network Monitoring, Image Analysis, Virtual Machines, Virtualization and Virtual Machines, Virtual Environment, Open Source Technology, Malware Protection, Command-Line Interface, Software Installation, File Management, Microsoft Windows

    4.6
    Rating, 4.6 out of 5 stars
    ·
    14 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Web Hacker's Toolbox - Tools Used by Successful Hackers

    Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, Proxy Servers, SQL, MySQL, Databases

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    Microsoft Security, Compliance & Identity Fundamentals

    Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Security Software, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Cloud Services, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Infrastructure Security, Encryption

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Threat Hunting Techniques

    Skills you'll gain: Cyber Threat Hunting, Splunk, Threat Detection, Jupyter, Anomaly Detection, Threat Management, Cybersecurity, Data Analysis, Data Science, Data Wrangling, Applied Machine Learning, Security Information and Event Management (SIEM), Data Cleansing, Data Transformation, Data Preprocessing, MLOps (Machine Learning Operations), Unsupervised Learning, Automation

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    E

    EDUCBA

    Corporate Fraud: Detect, Prevent & Implement Controls

    Skills you'll gain: Fraud detection, Sarbanes Oxley Act (SOX) Compliance, Financial Controls, Auditing, Financial Statement Analysis, Financial Statements, Financial Auditing, Internal Controls, Investigation, Internal Auditing, Financial Regulations, Compliance Management, Financial Analysis, Anomaly Detection, Financial Regulation, Risk Control, Business Ethics, Compliance Reporting, Case Studies, Advanced Analytics

    4.4
    Rating, 4.4 out of 5 stars
    ·
    14 reviews

    Mixed · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Securing Cloud Applications with Identity Aware Proxy (IAP) using Zero-Trust

    Skills you'll gain: Google App Engine, Cloud Deployment, Application Deployment, Zero Trust Network Access, Cloud Security, Google Cloud Platform, Cloud Applications, Security Controls, Identity and Access Management, Cloud Computing, Network Security

    Intermediate · Project · Less Than 2 Hours

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Application Security Testing and Debugging

    Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Security Strategy, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Vulnerability Scanning, Continuous Monitoring, Software Testing, Cybersecurity, Vulnerability Assessments, Cyber Security Assessment, Test Automation, Vulnerability Management, Technical Communication

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Asymmetric Cryptography and Key Management

    Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

    4.7
    Rating, 4.7 out of 5 stars
    ·
    281 reviews

    Intermediate · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Retrieving Credentials from Secret Manager with Spring Boot

    Skills you'll gain: Spring Boot, Cloud Deployment, Application Deployment, Google Cloud Platform, Cloud Applications, Key Management, System Configuration, Software Configuration Management, Application Development, Java

    Intermediate · Project · Less Than 2 Hours

1…362363364365

In summary, here are 10 of our most popular authentication methods courses

  • Secure Access Control: Coursera
  • Fundamentals of Network Security and Cryptography: Packt
  • Digital Forensics for Pentesters - Hands-On Learning: Packt
  • Web Hacker's Toolbox - Tools Used by Successful Hackers: Packt
  • Microsoft Security, Compliance & Identity Fundamentals: Whizlabs
  • Threat Hunting Techniques: Starweaver
  • Corporate Fraud: Detect, Prevent & Implement Controls: EDUCBA
  • Securing Cloud Applications with Identity Aware Proxy (IAP) using Zero-Trust: Google Cloud
  • Application Security Testing and Debugging: Starweaver
  • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok