More to explore:

All Results

  • Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • Skills you'll gain: Cryptographic Protocols, Public Key Infrastructure, Threat Detection, Cloud Security, IT Security Architecture, Network Security, Public Key Cryptography Standards (PKCS), Cryptography, Cloud Computing, Key Management, Cloud Infrastructure, Enterprise Architecture, Cloud Services, Virtualization, Security Engineering, Security Management, Data Management, Security Software, Security Awareness, TCP/IP

  • Skills you'll gain: Quantum computing, Emerging Technologies, Hardware Architecture, Mathematical Software, Failure Analysis, Simulation and Simulation Software, Software Engineering Tools, Theoretical Computer Science, Mathematical Modeling, Simulations

  • Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Deployment, Cloud Security, Cloud Technologies, Cloud Infrastructure, Cloud Platforms, Cloud Engineering, Cloud Computing, Cloud Storage, Infrastructure As A Service (IaaS), Emerging Technologies, Cloud-Native Computing, Hybrid Cloud Computing, IBM Cloud, Virtual Machines, Serverless Computing, Microservices, DevOps

  • Skills you'll gain: User Story, Cloud Deployment, CI/CD, Software Development Life Cycle, Open Web Application Security Project (OWASP), Continuous Integration, Istio, Linux Commands, Software Architecture, Test Driven Development (TDD), Cloud Computing Architecture, Application Deployment, Devops Tools, Restful API, Git (Version Control System), DevOps, Grafana, Software Engineering, Python Programming, Application Development

What brings you to Coursera today?

  • Skills you'll gain: Prometheus (Software), Kubernetes, CI/CD, Grafana, Application Deployment, Devops Tools, DevOps, Continuous Deployment, Containerization, Cloud-Native Computing, Security Controls, System Monitoring, Application Security, Continuous Delivery, Git (Version Control System), Configuration Management, Command-Line Interface, Software Installation, Microsoft Teams, User Interface (UI)

  • Skills you'll gain: Computing Platforms, Cloud Computing, Information Technology, Cybersecurity, Linear Algebra, Critical Thinking

  • University of Colorado System

    Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

  • Status: Job Skills

    Skills you'll gain: NoSQL, Extract, Transform, Load, Database Administration, Apache Spark, Data Warehousing, Web Scraping, Data Pipelines, Apache Hadoop, Database Architecture and Administration, Database Design, Database Management, Linux Commands, SQL, IBM Cognos Analytics, Data Store, Generative AI, Professional Networking, Python Programming, Data Analysis, Data Science

  • Status: Job Skills

    Skills you'll gain: Data Storytelling, Media Planning, Social Media Marketing, Google Ads, Email Marketing, Social Media Strategy, Order Fulfillment, Paid media, Social Media Management, Online Advertising, Search Engine Optimization, Performance Measurement, Spreadsheet Software, Client Services, Campaign Management, E-Commerce, Loyalty Programs, Marketing, Web Presence, Interviewing Skills

  • Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms