Macquarie University
Cyber Security: Data & Identity Security Specialization
Macquarie University

Cyber Security: Data & Identity Security Specialization

Data and Identity Protection Mastery. Learn to secure information, control digital access, and apply cryptography in real-world systems

Matt Bushby

Instructor: Matt Bushby

Access provided by DBS Bank

Get in-depth knowledge of a subject
Intermediate level
Some related experience required
4 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject
Intermediate level
Some related experience required
4 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Secure sensitive data with advanced privacy and protection techniques.

  • Design and manage robust identity and access management systems.

  • Apply cryptographic tools to protect data at rest, in transit, and in use.

  • Ensure compliance with global regulations while preserving digital trust.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

September 2025

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Macquarie University

Specialization - 3 course series

What you'll learn

  • Understand key risks to data security and privacy in digital environments.

  • Apply de-identification and anonymisation methods to protect sensitive data.

  • Navigate global privacy frameworks like GDPR and local legal obligations.

  • Implement controls to secure data across storage, access, and sharing systems.

Skills you'll gain

Category: Information Privacy
Category: Data Security
Category: Cyber Risk
Category: Threat Modeling
Category: Threat Detection
Category: Security Management
Category: NIST 800-53
Category: Data Governance
Category: Risk Management
Category: Data Ethics
Category: Vulnerability Assessments
Category: Cybersecurity
Category: Security Software
Category: Personally Identifiable Information
Category: Compliance Management
Category: Security Strategy
Category: General Data Protection Regulation (GDPR)
Category: Vulnerability
Category: Data Encryption Standard
Category: Data Access

What you'll learn

  • Design and manage secure authentication systems.

  • Implement SSO, MFA, and passwordless authentication.

  • Control user access with modern IAM frameworks.

  • Detect and respond to identity-based cyber threats.

Skills you'll gain

Category: Identity and Access Management
Category: Authentications
Category: Single Sign-On (SSO)
Category: User Provisioning
Category: Multi-Factor Authentication
Category: Cyber Security Assessment
Category: Azure Active Directory
Category: Cybersecurity
Category: Threat Detection
Category: Key Management
Category: Risk Management
Category: AWS Identity and Access Management (IAM)
Category: OAuth
Category: Threat Management
Category: User Accounts
Category: Cryptography
Category: Remote Access Systems
Category: Security Assertion Markup Language (SAML)
Category: Threat Modeling
Category: Role-Based Access Control (RBAC)

What you'll learn

  • Understand core cryptographic principles, algorithms, and encryption methods.

  • Apply symmetric and asymmetric encryption to secure data and communications.

  • Explore cryptography in real-world systems like blockchain and VPNs.

  • Evaluate cryptographic risks and implement secure key management practices.

Skills you'll gain

Category: Encryption
Category: Cryptography
Category: Key Management
Category: Network Security
Category: Wireless Networks
Category: Data Security
Category: Blockchain
Category: Virtual Private Networks (VPN)
Category: Data Integrity
Category: Data Encryption Standard
Category: Application Security
Category: Emerging Technologies
Category: Intellectual Property
Category: Public Key Infrastructure
Category: Security Engineering
Category: Security Management
Category: Hardware Architecture
Category: Authentications
Category: Cybersecurity

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
15 Courses9,428 learners

Offered by

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."