• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Device Identity Lifecycle


Results for "device identity lifecycle"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Data & Identity Security

    Skills you'll gain: Cryptography, Identity and Access Management, Network Security, Data Security, Authentications, User Provisioning, Encryption, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Advanced Encryption Standard (AES), Single Sign-On (SSO), Threat Modeling, Cyber Attacks, Cyber Risk, Cybersecurity, Computer Security, Data Management, Cyber Security Strategy, Security Management, Security Awareness

    4.3
    Rating, 4.3 out of 5 stars
    ·
    9 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Preview
    Preview
    I

    IBM

    Introduction to the Threat Intelligence Lifecycle

    Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Management, Data Validation, Technical Communication, Automation, Requirements Analysis

    4.7
    Rating, 4.7 out of 5 stars
    ·
    34 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    iOS Access Control & Protecting Software & System Integrity

    Skills you'll gain: Apple iOS, Role-Based Access Control (RBAC), Vulnerability Assessments, iOS Development, Software Testing, Authentications, Unit Testing, Application Security, Security Testing, Authorization (Computing), Secure Coding, Identity and Access Management, Debugging, Multi-Factor Authentication

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    Access Control, Software Protection, System Integrity

    Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Engineering, Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging, Encryption

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    Introduction to the Internet of Things and Embedded Systems

    Skills you'll gain: Embedded Systems, Internet Of Things, Embedded Software, Network Protocols, Wireless Networks, Computer Hardware, Network Architecture, System Software

    4.7
    Rating, 4.7 out of 5 stars
    ·
    13K reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Identity Access Management and Authentication

    Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems

    Beginner · Course · 1 - 3 Months

What brings you to Coursera today?

  • Status: Preview
    Preview
    W

    Whizlabs

    Getting Started with Microsoft Entra

    Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Authentications, Identity and Access Management, User Provisioning, Microsoft Azure, Multi-Factor Authentication, Authorization (Computing), Single Sign-On (SSO), User Accounts, Security Controls, Proxy Servers

    Beginner · Course · 1 - 4 Weeks

  • The Google AI Certificate that powers your career

    Enroll now
  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    CertNexus

    Internet of Things (IoT) Security (Exam ITS-110)

    Skills you'll gain: Application Security, Network Security, Information Systems Security, Cloud Security, Cybersecurity, System Monitoring, Internet Of Things, Network Monitoring, Cyber Attacks, Mobile Security, Cryptography, Information Privacy, Authorization (Computing), Wireless Networks, Authentications, Data Storage, Patch Management, Operating Systems, Cloud Services, Cloud Platforms

    Intermediate · Specialization · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    I

    ISC2

    Foundations of Software Lifecycle Development and Security

    Skills you'll gain: IT Security Architecture, Systems Development Life Cycle, Security Controls, Software Testing, Security Management, Software Development, Cybersecurity, Data Security, Continuous Monitoring, Risk Management Framework, Authorization (Computing), Identity and Access Management

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    P

    Packt

    Exam MS-100 Microsoft 365 Identity and Services Course

    Intermediate · Course · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Incident Response and Cyber Forensics

    Skills you'll gain: Incident Response, Digital Forensics, Distributed Denial-Of-Service (DDoS) Attacks, Security Information and Event Management (SIEM), Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Continuous Monitoring, Event Monitoring, System Monitoring, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Threat Hunting, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Detection, Malware Protection, Cyber Attacks, Cyber Engineering

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    Y

    Yonsei University

    Smart Device & Mobile Emerging Technologies

    Skills you'll gain: Wireless Networks, Telecommunications, Apple iOS, Display Devices, Product Planning, Android (Operating System), Business Strategy, Network Analysis, Emerging Technologies, Operating Systems, Peripheral Devices, Market Trend, Technical Standard

    4.7
    Rating, 4.7 out of 5 stars
    ·
    486 reviews

    Beginner · Course · 1 - 3 Months

What brings you to Coursera today?

1234…166

In summary, here are 10 of our most popular device identity lifecycle courses

  • Cyber Security: Data & Identity Security: Macquarie University
  • Introduction to the Threat Intelligence Lifecycle : IBM
  • iOS Access Control & Protecting Software & System Integrity: Infosec
  • Access Control, Software Protection, System Integrity: Infosec
  • Introduction to the Internet of Things and Embedded Systems: University of California, Irvine
  • Cyber Security: Identity Access Management and Authentication: Macquarie University
  • Getting Started with Microsoft Entra: Whizlabs
  • Internet of Things (IoT) Security (Exam ITS-110): CertNexus
  • Foundations of Software Lifecycle Development and Security: ISC2
  • Exam MS-100 Microsoft 365 Identity and Services Course: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok