More to explore:

All Results

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

  • Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

  • Birla Institute of Technology & Science, Pilani

    Skills you'll gain: Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Cryptographic Protocols, Encryption, Authentications, Data Encryption Standard, Advanced Encryption Standard (AES), Key Management, Network Protocols, Email Security, Cybersecurity, Network Security, Security Software, Data Integrity, Multi-Factor Authentication, Firewall

  • University of Maryland, College Park

    Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms

  • Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Incident Management, Network Security, Authentications, Mobile Security, OSI Models, Security Controls, Configuration Management, Risk Analysis

What brings you to Coursera today?

  • Skills you'll gain: Application Security, Network Security, Information Systems Security, Cloud Security, Cybersecurity, System Monitoring, Internet Of Things, Network Monitoring, Cyber Attacks, Mobile Security, Cryptography, Information Privacy, Authorization (Computing), Wireless Networks, Authentications, Data Storage, Patch Management, Operating Systems, Cloud Services, Cloud Platforms

  • University of Colorado Boulder

    Skills you'll gain: Estimation, Electrical Engineering, Numerical Analysis, Linear Algebra, Physics, Angular, Applied Mathematics, Advanced Mathematics, Mathematical Modeling, Mechanics, Calculus, Differential Equations, Engineering Analysis, Physical Science

  • Skills you'll gain: Quantum computing, Emerging Technologies, Hardware Architecture, Mathematical Software, Failure Analysis, Simulation and Simulation Software, Software Engineering Tools, Theoretical Computer Science, Mathematical Modeling, Simulations

  • Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity

  • Stanford University

    Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability

  • Skills you'll gain: Cryptographic Protocols, Public Key Infrastructure, Threat Detection, Cloud Security, IT Security Architecture, Network Security, Cryptography, Cloud Computing, Key Management, Cloud Infrastructure, Enterprise Architecture, Cloud Services, Encryption, Virtualization, Security Engineering, Security Management, Data Management, Security Software, Security Awareness, TCP/IP