More to explore:

All Results

  • Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

  • Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Incident Management, Network Security, Authentications, Mobile Security, OSI Models, Security Controls, Configuration Management, Risk Analysis

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • University of Colorado Boulder

    Skills you'll gain: Estimation, Electrical Engineering, Numerical Analysis, Linear Algebra, Physics, Angular, Applied Mathematics, Advanced Mathematics, Mathematical Modeling, Mechanics, Calculus, Differential Equations, Engineering Analysis, Physical Science

  • Skills you'll gain: Endpoint Detection and Response, Network Administration, Cryptographic Protocols, IT Security Architecture, Cloud Security, Data Loss Prevention, Cloud Deployment, Cyber Attacks, Security Controls, Infrastructure Security, Computer Security, Encryption, Cloud Computing, Authorization (Computing), Network Planning And Design, Identity and Access Management, System Configuration, Data Security, Authentications, Malware Protection

  • Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Deployment, Cloud Security, Cloud Technologies, Cloud Infrastructure, Cloud Platforms, Cloud Engineering, Cloud Computing, Cloud Storage, Infrastructure As A Service (IaaS), Emerging Technologies, Cloud-Native Computing, Hybrid Cloud Computing, IBM Cloud, Virtual Machines, Serverless Computing, Microservices, DevOps

What brings you to Coursera today?

  • Skills you'll gain: Quantum computing, Emerging Technologies, Hardware Architecture, Mathematical Software, Failure Analysis, Simulation and Simulation Software, Software Engineering Tools, Theoretical Computer Science, Mathematical Modeling, Simulations

  • Skills you'll gain: Cryptographic Protocols, Public Key Infrastructure, Threat Detection, Cloud Security, IT Security Architecture, Network Security, Public Key Cryptography Standards (PKCS), Cryptography, Cloud Computing, Key Management, Cloud Infrastructure, Enterprise Architecture, Cloud Services, Virtualization, Security Engineering, Security Management, Data Management, Security Software, Security Awareness, TCP/IP

  • Skills you'll gain: Computing Platforms, Cloud Computing, Information Technology, Cybersecurity, Theoretical Computer Science, Linear Algebra, Critical Thinking

  • Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms

  • University of Colorado System

    Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

  • Skills you'll gain: Blockchain, Vulnerability Assessments, Cryptography, Cryptographic Protocols, Security Controls, Vulnerability Management, Security Engineering, Threat Management, Data Security, Cyber Threat Intelligence, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Scripting, Network Protocols, Regulatory Compliance, Financial Regulation, Scalability