• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cryptographic Techniques

Results for "cryptographic techniques"


  • I

    Illinois Tech

    Cyber Security Technologies

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Business Continuity Planning, Cryptography, Security Architecture Review, Disaster Recovery, Business Continuity, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, Law, Regulation, and Compliance, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Governance Risk Management and Compliance

    ★ 4.4 (25) · Intermediate · Course · 1 - 3 Months

    Category: Preview
    Preview
    Category: Build toward a degree
    Build toward a degree
  • J

    Johns Hopkins University

    Advanced Cybersecurity Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Exploitation techniques, Mobile Security, Vulnerability Scanning, Cybersecurity, Security Testing, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Network Protocols

    Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation

    ★ 4.7 (178) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • J

    Johns Hopkins University

    Introduction to Penetration Testing and Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Exploitation techniques, Security Testing, Key Management, Encryption, Technical Writing, Human Factors (Security), Technical Communication

    ★ 3.9 (9) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    ISC2

    Cryptography

    Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms

    ★ 4.8 (95) · Beginner · Course · 1 - 4 Weeks

    Category: Credit offered
    Credit offered
  • P

    Packt

    TLS & HTTPS Explained – Visualizations & Localhost Setup

    Skills you'll gain: Network Security, Data Security, Emerging Technologies, Quantum computing

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Category: Credit offered
    Credit offered
  • N

    New York University

    Cyber Attack Countermeasures

    Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)

    ★ 4.7 (710) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • M

    Macquarie University

    Cyber Security: Mobile Security

    Skills you'll gain: Mobile Security, Digital Forensics, Investigation, Mobile Development, Criminal Investigation and Forensics, Endpoint Security, Cybersecurity, iOS Development, Application Security, Cyber Security Strategy, Computer Security Incident Management, Computer Security, Data Analysis Software, Authentications, Data Integrity, Data Storage

    ★ 4.6 (14) · Beginner · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Advanced Penetration Techniques

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)

    Advanced · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • S

    SkillUp

    Blockchain and Cryptography Overview

    Skills you'll gain: Blockchain, Cryptography, Cybersecurity, Network Security, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cyber Risk, Data Integrity, Transaction Processing

    ★ 5 (7) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Pearson

    Practical Cybersecurity Fundamentals: Unit 1

    Skills you'll gain: Cybersecurity, Network Security, Disaster Recovery, Cryptography, Cyber Operations, Encryption, Infrastructure as Code (IaC), Infrastructure Security, Software-Defined Networking, Security Management, Identity and Access Management, Security Controls, System Monitoring, Network Architecture, Event Monitoring, Virtual Networking, Authorization (Computing), Authentications

    Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • S

    Simplilearn

    Cyber Security Hashing Training for Beginners

    Skills you'll gain: Cybersecurity, Data Security, Cryptography, AI Security, Data Storage, Data Integrity, Algorithms

    Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1…456…470

In summary, here are 10 of our most popular cryptographic techniques courses

  • Cyber Security Technologies: Illinois Tech
  • Advanced Cybersecurity Techniques: Johns Hopkins University
  • Identifying Security Vulnerabilities: University of California, Davis
  • Introduction to Penetration Testing and Ethical Hacking: Johns Hopkins University
  • Cryptography : ISC2
  • TLS & HTTPS Explained – Visualizations & Localhost Setup: Packt
  • Cyber Attack Countermeasures: New York University
  • Cyber Security: Mobile Security: Macquarie University
  • Advanced Penetration Techniques: Packt
  • Blockchain and Cryptography Overview: SkillUp

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok