• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Cryptographic Techniques

Results for "cryptographic techniques"


  • T

    The Hong Kong University of Science and Technology

    Discrete Math for Computer Science - Algorithms & Recursion

    Skills you'll gain: Cryptography, Algorithms, Encryption, Theoretical Computer Science, Combinatorics, Arithmetic, Applied Mathematics, Logical Reasoning

    Beginner · Course · 1 - 3 Months

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    Institut Mines-Télécom

    Blockchain : enjeux et mécanismes cryptographiques

    Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Payment Systems, FinTech, Transaction Processing, Authentications, Data Security, Business Logic, Data Structures, Data Integrity, Algorithms, Verification And Validation

    Intermediate · Course · 1 - 3 Months

    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • I

    Infosec

    Memory, Encryption, and Protecting Data in Android

    Skills you'll gain: Cryptography, Encryption, Android Development, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Application Security, Data Loss Prevention, Network Security, Exploitation techniques, Memory Management, File Systems

    Mixed · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    Cisco Learning and Certifications

    Network Security Principles

    Skills you'll gain: Network Security, Role-Based Access Control (RBAC), Cybersecurity, Firewall, Network Monitoring, Authentications, Virtual Private Networks (VPN), Authorization (Computing), Intrusion Detection and Prevention, Identity and Access Management, Security Controls, Encryption, Group Policy

    Beginner · Course · 1 - 3 Months

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of London

    Applied Mathematical Methods for Computing

    Skills you'll gain: Combinatorics, Probability & Statistics, Data Analysis, Advanced Mathematics, Linear Algebra, Mathematics and Mathematical Modeling, Mathematical Theory & Analysis, Geometry, Applied Mathematics, Statistics, Statistical Analysis, Statistical Methods, Probability, Algorithms, Algebra, Descriptive Statistics

    Beginner · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers

    ★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Build toward a degree
    Build toward a degree
  • M

    Macquarie University

    Cyber Security: Mobile Security

    Skills you'll gain: Digital Forensics, Mobile Security, Investigation, Mobile Development, Criminal Investigation and Forensics, Endpoint Security, Cybersecurity, iOS Development, Application Security, Cyber Security Strategy, Computer Security Incident Management, Computer Security, Data Analysis Software, Authentications, Data Integrity, Data Storage

    ★ 4.6 (14) · Beginner · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Intermediate Ethical Hacking Techniques

    Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL

    ★ 3.8 (9) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Comprehensive Cisco Security Techniques and Automation

    Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Data Loss Prevention, Network Security, Patch Management, System Configuration, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Authorization (Computing), Identity and Access Management, Enterprise Application Management

    Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Minnesota

    Cloud Top Ten Risks

    Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Continuous Monitoring, Threat Management, Security Controls, Application Security, Secure Coding, System Monitoring, Cryptographic Protocols, Cryptography, Event Monitoring, Data Security, Identity and Access Management, Role-Based Access Control (RBAC), Hardening

    ★ 4.6 (26) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • D

    Duke University

    Rust Secret Cipher CLI

    Skills you'll gain: Rust (Programming Language), Command-Line Interface, Build Tools, Encryption, Package and Software Management, Application Development, Cryptography, Software Engineering

    Beginner · Guided Project · Less Than 2 Hours

    Category: Credit offered
    Credit offered
  • J

    Johns Hopkins University

    Advanced Neural Network Techniques

    Skills you'll gain: Autoencoders, Recurrent Neural Networks (RNNs), Deep Learning, Artificial Neural Networks, Reinforcement Learning, Generative AI, Generative Adversarial Networks (GANs), Generative Model Architectures, Unsupervised Learning, Responsible AI, Data Ethics, Markov Model

    ★ 4 (7) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1…8910…469

In summary, here are 10 of our most popular cryptographic techniques courses

  • Discrete Math for Computer Science - Algorithms & Recursion: The Hong Kong University of Science and Technology
  • Blockchain : enjeux et mécanismes cryptographiques: Institut Mines-Télécom
  • Memory, Encryption, and Protecting Data in Android: Infosec
  • Network Security Principles: Cisco Learning and Certifications
  • Applied Mathematical Methods for Computing: University of London
  • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
  • Cyber Security: Mobile Security: Macquarie University
  • Intermediate Ethical Hacking Techniques: Packt
  • Comprehensive Cisco Security Techniques and Automation: Packt
  • Cloud Top Ten Risks: University of Minnesota

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok