• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Encryption

Results for "encryption"


  • P

    Packt

    Digital Identity & Security – Introduction to PKI

    Skills you'll gain: Key Management, Network Security, Digital Communications

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    2

    28DIGITAL

    Security and Privacy for Big Data - Part 1

    Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Controls, Cryptographic Protocols, Security Management, Data Access, Vulnerability Assessments, Encryption, Vulnerability Management, Big Data, Authorization (Computing), Identity and Access Management, Cyber Risk

    4.7
    Rating, 4.7 out of 5 stars
    ·
    587 reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    ISC2

    Systems and Application Security

    Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Infrastructure Security, Cloud Deployment, Cloud Computing, Threat Detection, Cyber Attacks, Endpoint Detection and Response, Cybersecurity, Information Systems Security, Virtualization, Virtualization and Virtual Machines, Virtual Machines, Security Controls, Intrusion Detection and Prevention, Data Security, Human Factors (Security)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    34 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Asymmetric Cryptography and Key Management

    Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

    4.7
    Rating, 4.7 out of 5 stars
    ·
    281 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Cybersecurity Threat Vectors and Mitigation

    Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Cyber Security Policies, Network Security, Authorization (Computing), Cryptography, Endpoint Security, Data Security, Security Controls, Active Directory, Identity and Access Management, Cryptographic Protocols, Firewall

    4.8
    Rating, 4.8 out of 5 stars
    ·
    316 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Classical Cryptosystems and Core Concepts

    Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Cryptography Standards (PKCS), Data Integrity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    428 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    178 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cryptography and Information Theory

    Skills you'll gain: Cryptography, Brute-force attacks, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Information Assurance, Theoretical Computer Science, Threat Modeling, Communication Systems

    4.5
    Rating, 4.5 out of 5 stars
    ·
    550 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    D

    Duke University

    Java Programming: Arrays, Lists, and Structured Data

    Skills you'll gain: File I/O, Object Oriented Design, Java Programming, Object Oriented Programming (OOP), Data Structures, Java, Cryptography, Software Engineering, Computer Programming, Code Reusability, Algorithms, Encryption, Maintainability, Data Store, Program Development, Web Analytics and SEO, Data Import/Export, Web Servers, Server Side

    4.6
    Rating, 4.6 out of 5 stars
    ·
    3.2K reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Pearson

    (SSCP) Systems Security Certified Practitioner: Unit 2

    Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Key Management, Digital Communications

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    2

    28DIGITAL

    Security and Privacy for Big Data - Part 2

    Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Vulnerability Management, Vulnerability Assessments, Law, Regulation, and Compliance, Big Data, Encryption, Cryptography, Cryptographic Protocols

    4.7
    Rating, 4.7 out of 5 stars
    ·
    262 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Minnesota

    Cloud Data Security

    Skills you'll gain: Cloud Security, Data Security, Cloud Services, Cloud Storage, Personally Identifiable Information, General Data Protection Regulation (GDPR), Information Privacy, Data Management, Data Storage, Data Governance, Data Integrity, Security Controls, Analysis, Authorization (Computing), Health Insurance Portability And Accountability Act (HIPAA) Compliance, Relational Databases, Encryption, SQL

    4.2
    Rating, 4.2 out of 5 stars
    ·
    27 reviews

    Intermediate · Course · 1 - 4 Weeks

1…567…39

In summary, here are 10 of our most popular encryption courses

  • Digital Identity & Security – Introduction to PKI: Packt
  • Security and Privacy for Big Data - Part 1: 28DIGITAL
  • Systems and Application Security: ISC2
  • Asymmetric Cryptography and Key Management: University of Colorado System
  • Cybersecurity Threat Vectors and Mitigation: Microsoft
  • Classical Cryptosystems and Core Concepts: University of Colorado System
  • Identifying Security Vulnerabilities: University of California, Davis
  • Cryptography and Information Theory: University of Colorado System
  • Java Programming: Arrays, Lists, and Structured Data: Duke University
  • (SSCP) Systems Security Certified Practitioner: Unit 2: Pearson

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok