• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Encryption Techniques

Results for "encryption techniques"


  • P

    Packt

    Amazon S3 Deep Dive – Complete AWS Cloud Storage Guide

    Skills you'll gain: Amazon S3, Amazon Web Services, AWS CloudFormation, Cloud Storage, Infrastructure as Code (IaC), Data Security, AWS Identity and Access Management (IAM), Cloud Hosting, Cloud Security, Performance Tuning, Data Storage, Data Storage Technologies, Data Access, Data Management, Command-Line Interface, Encryption

    Intermediate · Course · 3 - 6 Months

    Category: Credit offered
    Credit offered
  • P

    Packt

    Advanced Penetration Techniques

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)

    Advanced · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    Coursera

    Secure Healthcare Data: Encrypt, Audit, Protect

    Skills you'll gain: Data Security, Security Controls, Health Care Procedure and Regulation, Computer Security Awareness Training, Cybersecurity, Cryptographic Protocols, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM)

    Beginner · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    ISC2

    Cryptography

    Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms

    ★ 4.8 (95) · Beginner · Course · 1 - 4 Weeks

    Category: Credit offered
    Credit offered
  • L

    LearnKartS

    Information Security Foundations

    Skills you'll gain: Security Controls, Cybersecurity, Encryption, Cyber Attacks, Information Systems Security, Cryptographic Protocols, Threat Management, Vulnerability Assessments, Vulnerability, Cyber Security Assessment, Vulnerability Scanning, Threat Detection, Cloud Security, Key Management, Asset Protection, Security Awareness, Gap Analysis

    ★ 4.6 (33) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • S

    Simplilearn

    Cyber Security Hashing Training for Beginners

    Skills you'll gain: Cybersecurity, Data Security, Cryptography, AI Security, Data Storage, Data Integrity, Algorithms

    Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    Infosec

    Memory, Encryption, and Protecting Data in iOS

    Skills you'll gain: iOS Development, Secure Coding, Encryption, Network Security, Swift Programming, Mobile Security, Application Security, Data Persistence, Key Management, Data Security, Cryptography, Data Storage

    Mixed · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • S

    Starweaver

    Deception As a Defense

    Skills you'll gain: Threat Management, Vulnerability Management, Cybersecurity, Cyber Security Strategy, Threat Detection, Network Security, Cyber Attacks, Patch Management, Configuration Management

    ★ 5 (6) · Beginner · Course · 1 - 4 Weeks

    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • I

    Illinois Tech

    Cyber Security Technologies

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Business Continuity Planning, Cryptography, Security Architecture Review, Disaster Recovery, Business Continuity, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, Law, Regulation, and Compliance, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Governance Risk Management and Compliance

    ★ 4.4 (25) · Intermediate · Course · 1 - 3 Months

    Category: Preview
    Preview
    Category: Build toward a degree
    Build toward a degree
  • B

    Ball State University

    Cybersecurity and Secure Software Design

    Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Cryptographic Protocols, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Secure Coding, Key Management, Application Development, Public Key Infrastructure, Network Protocols, Data Integrity

    ★ 5 (6) · Intermediate · Course · 1 - 3 Months

    Category: Preview
    Preview
    Category: Build toward a degree
    Build toward a degree
  • P

    Packt

    Advanced Exploitation and Scripting Techniques

    Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation

    ★ 4.8 (13) · Advanced · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado System

    Cryptographic Hash and Integrity Protection

    Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Key Management, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications

    ★ 4.6 (99) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1…456…476

In summary, here are 10 of our most popular encryption techniques courses

  • Amazon S3 Deep Dive – Complete AWS Cloud Storage Guide: Packt
  • Advanced Penetration Techniques: Packt
  • Secure Healthcare Data: Encrypt, Audit, Protect: Coursera
  • Cryptography : ISC2
  • Information Security Foundations: LearnKartS
  • Cyber Security Hashing Training for Beginners: Simplilearn
  • Memory, Encryption, and Protecting Data in iOS: Infosec
  • Deception As a Defense: Starweaver
  • Cyber Security Technologies: Illinois Tech
  • Cybersecurity and Secure Software Design: Ball State University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok