Macquarie University

Cyber Security: Data & Identity Security Specialization

Macquarie University

Cyber Security: Data & Identity Security Specialization

Data and Identity Protection Mastery. Learn to secure information, control digital access, and apply cryptography in real-world systems

Matt Bushby

Instructor: Matt Bushby

Access provided by BITS Pilani

Get in-depth knowledge of a subject
Intermediate level
Some related experience required
4 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject
Intermediate level
Some related experience required
4 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Secure sensitive data with advanced privacy and protection techniques.

  • Design and manage robust identity and access management systems.

  • Apply cryptographic tools to protect data at rest, in transit, and in use.

  • Ensure compliance with global regulations while preserving digital trust.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

September 2025

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Macquarie University

Specialization - 3 course series

What you'll learn

  • Understand key risks to data security and privacy in digital environments.

  • Apply de-identification and anonymisation methods to protect sensitive data.

  • Navigate global privacy frameworks like GDPR and local legal obligations.

  • Implement controls to secure data across storage, access, and sharing systems.

Skills you'll gain

Category: Information Privacy
Category: Data Security
Category: Cybersecurity
Category: Data Encryption Standard
Category: Personally Identifiable Information
Category: NIST 800-53
Category: Cyber Risk
Category: Security Management
Category: Data Ethics
Category: Risk Management
Category: Compliance Management
Category: Data Access
Category: Threat Modeling
Category: Security Software
Category: Data Governance
Category: Security Strategy
Category: General Data Protection Regulation (GDPR)
Category: Vulnerability Assessments
Category: Data Integrity
Category: Vulnerability

What you'll learn

  • Design and manage secure authentication systems.

  • Implement SSO, MFA, and passwordless authentication.

  • Control user access with modern IAM frameworks.

  • Detect and respond to identity-based cyber threats.

Skills you'll gain

Category: Identity and Access Management
Category: User Provisioning
Category: Single Sign-On (SSO)
Category: Authentications
Category: System Design and Implementation
Category: Multi-Factor Authentication
Category: Cryptography
Category: OAuth
Category: Cybersecurity
Category: Remote Access Systems
Category: Threat Management
Category: Risk Management
Category: User Accounts
Category: Threat Modeling
Category: Security Assertion Markup Language (SAML)
Category: Key Management
Category: Cyber Security Assessment
Category: Role-Based Access Control (RBAC)
Category: Threat Detection
Category: Vulnerability Assessments

What you'll learn

  • Understand core cryptographic principles, algorithms, and encryption methods.

  • Apply symmetric and asymmetric encryption to secure data and communications.

  • Explore cryptography in real-world systems like blockchain and VPNs.

  • Evaluate cryptographic risks and implement secure key management practices.

Skills you'll gain

Category: Cryptography
Category: Encryption
Category: Wireless Networks
Category: Virtual Private Networks (VPN)
Category: Blockchain
Category: Hardware Architecture
Category: Cybersecurity
Category: Data Security
Category: Network Security
Category: Authentications
Category: Intellectual Property
Category: Emerging Technologies
Category: Security Engineering
Category: Security Management
Category: Data Encryption Standard
Category: Data Storage Technologies
Category: Public Key Infrastructure

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
15 Courses 14,171 learners

Offered by

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."