• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Authentication Methods

Results for "authentication methods"


  • Status: Free Trial
    Free Trial
    W

    Whizlabs

    Microsoft Security, Compliance & Identity Fundamentals

    Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Security Software, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Cloud Services, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Infrastructure Security, Encryption

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Threat Hunting Techniques

    Skills you'll gain: Cyber Threat Hunting, Splunk, Threat Detection, Jupyter, Anomaly Detection, Threat Management, Cybersecurity, Data Analysis, Data Science, Data Wrangling, Applied Machine Learning, Security Information and Event Management (SIEM), Data Cleansing, Data Transformation, Data Preprocessing, MLOps (Machine Learning Operations), Unsupervised Learning, Automation

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    E

    EDUCBA

    Corporate Fraud: Detect, Prevent & Implement Controls

    Skills you'll gain: Fraud detection, Sarbanes Oxley Act (SOX) Compliance, Financial Controls, Auditing, Financial Statement Analysis, Financial Statements, Financial Auditing, Internal Controls, Investigation, Internal Auditing, Financial Regulations, Compliance Management, Financial Analysis, Anomaly Detection, Financial Regulation, Risk Control, Business Ethics, Compliance Reporting, Case Studies, Advanced Analytics

    4.4
    Rating, 4.4 out of 5 stars
    ·
    14 reviews

    Mixed · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Securing Cloud Applications with Identity Aware Proxy (IAP) using Zero-Trust

    Skills you'll gain: Google App Engine, Cloud Deployment, Application Deployment, Zero Trust Network Access, Cloud Security, Google Cloud Platform, Cloud Applications, Security Controls, Identity and Access Management, Cloud Computing, Network Security

    Intermediate · Project · Less Than 2 Hours

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Application Security Testing and Debugging

    Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Security Strategy, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Vulnerability Scanning, Continuous Monitoring, Software Testing, Cybersecurity, Vulnerability Assessments, Cyber Security Assessment, Test Automation, Vulnerability Management, Technical Communication

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Asymmetric Cryptography and Key Management

    Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

    4.7
    Rating, 4.7 out of 5 stars
    ·
    281 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Securing Applications with Checkmarx

    Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Containerization, Computer Programming

    Intermediate · Course · 1 - 4 Weeks

1…362363364365

In summary, here are 8 of our most popular authentication methods courses

  • Microsoft Security, Compliance & Identity Fundamentals: Whizlabs
  • Threat Hunting Techniques: Starweaver
  • Corporate Fraud: Detect, Prevent & Implement Controls: EDUCBA
  • Securing Cloud Applications with Identity Aware Proxy (IAP) using Zero-Trust: Google Cloud
  • Application Security Testing and Debugging: Starweaver
  • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
  • Asymmetric Cryptography and Key Management: University of Colorado System
  • Securing Applications with Checkmarx: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok