More to explore:

All Results

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • Status: Free Trial

    Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

  • Status: Free Trial
    Status: AI skills

    Skills you'll gain: User Story, Cloud Deployment, CI/CD, Software Development Life Cycle, Open Web Application Security Project (OWASP), Continuous Integration, Istio, Linux Commands, Software Architecture, Test Driven Development (TDD), Cloud Computing Architecture, Application Deployment, Devops Tools, Restful API, Git (Version Control System), DevOps, Grafana, Software Engineering, Python Programming, Application Development

  • Status: Free

    Skills you'll gain: Quantum computing, Emerging Technologies, Hardware Architecture, Mathematical Software, Failure Analysis, Simulation and Simulation Software, Software Engineering Tools, Theoretical Computer Science, Mathematical Modeling, Simulations

  • Status: New
    Status: Free Trial

    Skills you'll gain: Cryptographic Protocols, Public Key Infrastructure, Threat Detection, Cloud Security, IT Security Architecture, Network Security, Cryptography, Cloud Computing, Key Management, Cloud Infrastructure, Enterprise Architecture, Cloud Services, Encryption, Virtualization, Security Engineering, Security Management, Data Management, Security Software, Security Awareness, TCP/IP

  • Status: Free Trial

    Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Deployment, Cloud Security, Cloud Technologies, Cloud Infrastructure, Cloud Platforms, Cloud Engineering, Cloud Computing, Cloud Storage, Infrastructure As A Service (IaaS), Emerging Technologies, Cloud-Native Computing, Hybrid Cloud Computing, IBM Cloud, Virtual Machines, Serverless Computing, Microservices, DevOps

What brings you to Coursera today?

  • Status: Preview

    Skills you'll gain: Computing Platforms, Cloud Computing, Information Technology, Cybersecurity, Theoretical Computer Science, Linear Algebra, Critical Thinking

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

  • Status: Free Trial
    Status: AI skills

    Skills you'll gain: Data Storytelling, Media Planning, Social Media Marketing, Google Ads, Email Marketing, Social Media Strategy, Order Fulfillment, Paid media, Social Media Management, Online Advertising, Search Engine Optimization, Performance Measurement, Spreadsheet Software, Client Services, Campaign Management, E-Commerce, Loyalty Programs, Marketing, Web Presence, Interviewing Skills

  • Status: Free Trial

    Skills you'll gain: DevSecOps, Event Monitoring, Cloud Security, Security Management, DevOps, Data Access, Cyber Security Policies, Server Administration, Data Governance, System Configuration, Token Optimization, Data Storage

  • Status: Free Trial

    Skills you'll gain: Blockchain, Cryptography, Encryption, Key Management, Cryptographic Protocols, Data Security, Quantum computing, Information Privacy, Algorithms

  • Status: Free Trial

    Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Security Engineering, Threat Modeling, Threat Management, Cyber Security Assessment, Security Controls, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Regulatory Compliance, Network Protocols, Financial Regulation, Scalability, Scripting