• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cryptographic Attacks

Results for "cryptographic attacks"


  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cryptographic Hash and Integrity Protection

    Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Information Assurance, Data Security, Public Key Cryptography Standards (PKCS)

    4.6
    Rating, 4.6 out of 5 stars
    ·
    99 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Brute-force attacks, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    CertNexus

    CyberSec First Responder – Advanced (CFR-A): Attack

    Skills you'll gain: Metasploit, Exploit development, Exploitation techniques, Vulnerability, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, System Configuration, Data Security, Cybersecurity, Cyber Attacks, Linux, Bash (Scripting Language), Proxy Servers, Scripting, Linux Commands, Scripting Languages, Python Programming

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    178 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    S

    SkillUp

    Blockchain and Cryptography Overview

    5
    Rating, 5 out of 5 stars
    ·
    7 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Topics

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Data Persistence, Computer Architecture

    4.1
    Rating, 4.1 out of 5 stars
    ·
    9 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Mathematical Foundations for Cryptography

    Skills you'll gain: Cryptography, Arithmetic, Algorithms, Applied Mathematics, Probability, Computer Science

    4.6
    Rating, 4.6 out of 5 stars
    ·
    334 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud

    Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Information Systems Security, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, Malware Protection, Continuous Monitoring, IT Automation, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    724 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    A

    AI CERTs

    Securing the Assets: Bitcoin Security

    Skills you'll gain: Blockchain, Cryptography, Security Engineering, Threat Modeling, Threat Management, Data Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Strategy, Threat Detection, Information Systems Security, Application Security, Security Testing, Key Management, Encryption, Regulatory Compliance, Network Protocols, Financial Regulation, Scalability, Scripting

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Exploit Development, Malware, & Defensive Strategies

    Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming

    5
    Rating, 5 out of 5 stars
    ·
    7 reviews

    Advanced · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cyber Threats and Network Security Foundations

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California San Diego

    Number Theory and Cryptography

    Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Arithmetic, Algorithms, Theoretical Computer Science, Computational Thinking, Algebra, Python Programming

    4.5
    Rating, 4.5 out of 5 stars
    ·
    609 reviews

    Beginner · Course · 1 - 4 Weeks

1…567…53

In summary, here are 10 of our most popular cryptographic attacks courses

  • Cryptographic Hash and Integrity Protection: University of Colorado System
  • Advanced Cybersecurity Techniques: Johns Hopkins University
  • CyberSec First Responder – Advanced (CFR-A): Attack: CertNexus
  • Identifying Security Vulnerabilities: University of California, Davis
  • Blockchain and Cryptography Overview: SkillUp
  • Advanced Cybersecurity Topics: Johns Hopkins University
  • Mathematical Foundations for Cryptography: University of Colorado System
  • Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
  • Securing the Assets: Bitcoin Security: AI CERTs
  • Exploit Development, Malware, & Defensive Strategies: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok