All Results

University at Buffalo
Skills you'll gain: Blockchain, Test Driven Development (TDD), Cryptography, Development Testing, Test Script Development, Application Development, Transaction Processing, Emerging Technologies, Application Design, Application Frameworks, Cryptographic Protocols, Web Development Tools, Network Protocols, Program Development, Distributed Computing, Cloud Platforms, Computing Platforms, Development Environment, Integrated Development Environments, Programming Principles

Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

Skills you'll gain: Information Technology, Computer Hardware, Cloud Computing, Network Troubleshooting, Software Installation, Technical Support and Services, Help Desk Support, Cybersecurity, Cloud Infrastructure, Cyber Attacks, Information Technology Operations, Hardware Troubleshooting, Data Storage, General Networking, Database Software, Operating Systems, Package and Software Management, Computer Security Awareness Training, Peripheral Devices, Project Management

Korea Advanced Institute of Science and Technology(KAIST)
Skills you'll gain: Quantum computing, Communication Systems, Emerging Technologies, Theoretical Computer Science, Information Technology

University of Colorado Boulder
Skills you'll gain: Estimation, Electrical Engineering, Numerical Analysis, Linear Algebra, Physics, Angular, Applied Mathematics, Advanced Mathematics, Mathematical Modeling, Mechanics, Calculus, Differential Equations, Engineering Analysis, Physical Science
What brings you to Coursera today?

Google Quantum AI
Skills you'll gain: Quantum computing, Emerging Technologies, Hardware Architecture, Mathematical Software, Failure Analysis, Simulation and Simulation Software, Software Engineering Tools, Theoretical Computer Science, Mathematical Modeling, Simulations

Fractal Analytics
Skills you'll gain: Computing Platforms, Cloud Computing, Information Technology, Cybersecurity, Theoretical Computer Science, Linear Algebra, Critical Thinking

Duke University
Skills you'll gain: Blockchain, Loans, Lending and Underwriting, FinTech, Payment Systems, Cyber Risk, Operational Risk, Scalability, Regulatory Compliance, Interoperability, General Lending, Risk Management, Financial Inclusion, Financial Regulation, Legal Risk, Derivatives, Key Management, Finance, Entrepreneurial Finance, Entrepreneurship

Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity Planning, Cryptography, Encryption, Business Continuity, Disaster Recovery, Data Management, Security Engineering, Digital Assets, Threat Modeling, Vulnerability Assessments, Security Architecture Review, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Asset Protection, Vulnerability Management, Data Security

The Hong Kong University of Science and Technology
Skills you'll gain: Quantum computing, Physics, Chemistry, Experimentation, Advanced Mathematics, Informatics, Mechanics, Linear Algebra, Physical Science, Theoretical Computer Science, Differential Equations, Mathematical Modeling

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms