All Results

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Cryptographic Protocols, Encryption, Authentications, Data Encryption Standard, Advanced Encryption Standard (AES), Key Management, Network Protocols, Email Security, Cybersecurity, Network Security, Security Software, Data Integrity, Multi-Factor Authentication, Firewall

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms

Skills you'll gain: Model Deployment, Application Deployment, Model Optimization, Cloud Deployment, Fine-tuning, Containerization, Large Language Modeling, Docker (Software), Model Evaluation, API Design, Performance Tuning, Scalability, Memory Management
What brings you to Coursera today?

Skills you'll gain: Cloud Engineering, Cloud Deployment, Cloud Solutions, Cloud Computing Architecture, Cloud Services, Database Management Systems, Public Cloud, Cloud Security, Data Import/Export, Load Balancing, Virtual Networking, Cloud Platforms, Data Mapping, User Provisioning, Security Management, Data Storage Technologies, Security Controls, Enterprise Architecture, Multi-Factor Authentication, Event Monitoring

University of Colorado Boulder
Skills you'll gain: Estimation, Electrical Engineering, Numerical Analysis, Linear Algebra, Physics, Angular, Applied Mathematics, Advanced Mathematics, Mathematical Modeling, Mechanics, Calculus, Differential Equations, Engineering Analysis, Physical Science

Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability

Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Prompt Engineering Tools, Cloud Security, Containerization, Infrastructure As A Service (IaaS), Prompt Patterns, OAuth, Cloud Platforms, Cloud Storage, Cloud Services, Security Controls, Threat Management, Application Security, Data Security

Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity

Skills you'll gain: Cryptography, Encryption, Cybersecurity, Application Security, Brute-force attacks, Penetration Testing, Python Programming, Key Management, File I/O, Computational Logic, Program Development, Algorithms, Programming Principles, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components