• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cryptographic Attacks

Results for "cryptographic attacks"


  • P

    Packt

    Advanced Exploitation and Scripting Techniques

    Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation

    ★ 4.8 (13) · Advanced · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • S

    SkillUp

    Cutting-Edge Blockchain Security Mechanisms

    Skills you'll gain: Blockchain, Cryptography, Encryption, Cryptographic Protocols, Security Engineering, Threat Modeling, Security Architecture Review, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Transaction Processing, Exploitation techniques, Information Privacy

    Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Leeds

    An Introduction to Cryptography

    Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Data Security

    ★ 4.4 (16) · Beginner · Course · 1 - 4 Weeks

    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • E

    EDUCBA

    Python Cryptography: Build & Explore Classical Ciphers

    Skills you'll gain: Cryptography, Encryption, Key Management, Python Programming, Scripting, User Interface (UI), UI Components, Application Development

    Mixed · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • B

    Board Infinity

    Deep Dive into Cryptography

    Skills you'll gain: Blockchain, Cryptography, Encryption, Key Management, Cryptographic Protocols, Data Security, Quantum computing, Information Privacy, Algorithms

    Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado System

    Cryptographic Hash and Integrity Protection

    Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Key Management, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications

    ★ 4.6 (99) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado System

    Basic Cryptography and Programming with Crypto API

    Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Cryptographic Protocols, Application Security, Key Management, Secure Coding, Data Security, Web Development, Email Security, PHP (Scripting Language), Intrusion Detection and Prevention, Data Integrity, Algorithms, User Provisioning, Command-Line Interface

    ★ 4.5 (100) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud

    Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Security Management, Vulnerability Management, Threat Detection, Malware Protection, Infrastructure Security, Continuous Monitoring, Cloud API, IT Automation, Event Monitoring, Identity and Access Management

    ★ 4.7 (724) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    System Hacking, Malware Threats, and Network Attacks

    Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Cyber Threat Intelligence, Exploitation techniques, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Authentications, Network Protocols

    ★ 4.7 (9) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Unix and Windows

    Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Unix, Cyber Operations, Computer Security, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Memory Management, Remote Access Systems, Authentications

    Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Build toward a degree
    Build toward a degree
  • A

    Association of International Certified Professional Accountants

    Understanding, Using, and Securing Crypto and Digital Assets

    Skills you'll gain: Digital Assets, Blockchain, Asset Protection, Data Security, Cryptography, Security Management, Cybersecurity, Security Awareness, Key Management, Security Controls, Securities (Finance), Multi-Factor Authentication, Authentications, Securities Trading, Audit Working Papers, Financial Market, Market Data, Financial Regulations, Regulatory Compliance, Financial Accounting

    ★ 4.7 (93) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • S

    Simplilearn

    Block Cipher Modes of Operation Training

    Skills you'll gain: Encryption, Cryptography, Data Security, Cybersecurity

    Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1…789…60

In summary, here are 10 of our most popular cryptographic attacks courses

  • Advanced Exploitation and Scripting Techniques: Packt
  • Cutting-Edge Blockchain Security Mechanisms: SkillUp
  • An Introduction to Cryptography: University of Leeds
  • Python Cryptography: Build & Explore Classical Ciphers: EDUCBA
  • Deep Dive into Cryptography: Board Infinity
  • Cryptographic Hash and Integrity Protection: University of Colorado System
  • Basic Cryptography and Programming with Crypto API: University of Colorado System
  • Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
  • System Hacking, Malware Threats, and Network Attacks: Packt
  • Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok