More to explore:

All Results

  • Birla Institute of Technology & Science, Pilani

    Skills you'll gain: Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Cryptographic Protocols, Encryption, Authentications, Data Encryption Standard, Advanced Encryption Standard (AES), Key Management, Network Protocols, Email Security, Cybersecurity, Network Security, Security Software, Data Integrity, Multi-Factor Authentication, Firewall

  • Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

  • Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Incident Management, Network Security, Authentications, Mobile Security, OSI Models, Security Controls, Configuration Management, Risk Analysis

  • University of Maryland, College Park

    Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms

What brings you to Coursera today?

  • University of Colorado Boulder

    Skills you'll gain: Estimation, Electrical Engineering, Numerical Analysis, Linear Algebra, Physics, Angular, Applied Mathematics, Advanced Mathematics, Mathematical Modeling, Mechanics, Calculus, Differential Equations, Engineering Analysis, Physical Science

  • Skills you'll gain: Zero Trust Network Access, Identity and Access Management, Multi-Factor Authentication, Role-Based Access Control (RBAC), Security Controls, NIST 800-53, Network Architecture, Open Web Application Security Project (OWASP), Cyber Security Policies, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Cyber Threat Intelligence, Network Planning And Design, Cloud Computing, Security Strategy, Cyber Operations, Network Monitoring, Public Key Infrastructure, Hybrid Cloud Computing, Virtual Private Networks (VPN), Linux

  • Stanford University

    Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability

  • Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning

  • Skills you'll gain: Cryptography, Encryption, Cybersecurity, Application Security, Brute-force attacks, Penetration Testing, Python Programming, Key Management, File I/O, Computational Logic, Program Development, Algorithms, Programming Principles, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components

  • Skills you'll gain: Cryptographic Protocols, Public Key Infrastructure, Threat Detection, Cloud Security, IT Security Architecture, Network Security, Public Key Cryptography Standards (PKCS), Cryptography, Cloud Computing, Key Management, Cloud Infrastructure, Enterprise Architecture, Cloud Services, Virtualization, Security Engineering, Security Management, Data Management, Security Software, Security Awareness, TCP/IP