All Results

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms

Skills you'll gain: Email Security, Cybersecurity, Hardening, Authorization (Computing), Cyber Attacks, Security Awareness, Security Controls, Threat Management, Encryption, Data Security, Identity and Access Management, Authentications, Application Security, Endpoint Security, Threat Detection, Cryptography, Malware Protection, Patch Management, Multi-Factor Authentication

Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity

Amazon Web Services
Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, Data Security, Cryptography, Security Controls, Cryptographic Protocols

Skills you'll gain: Email Security, Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Hardening, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Authorization (Computing), Cyber Attacks, Information Technology, Cyber Security Strategy, Penetration Testing, Computer Security Incident Management

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science
What brings you to Coursera today?

Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Incident Response, Security Controls, Information Privacy, Data Management, Computer Security Incident Management, Security Strategy, Threat Management, Threat Detection, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Data Infrastructure, Risk Management, Cybersecurity, Compliance Management, Encryption, Incident Management

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

Skills you'll gain: Cryptography, Encryption, Cybersecurity, Application Security, Brute-force attacks, Penetration Testing, Python Programming, Key Management, File I/O, Computational Logic, Program Development, Algorithms, Programming Principles, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components

Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Cryptographic Protocols, Encryption, Authentications, Data Encryption Standard, Advanced Encryption Standard (AES), Key Management, Network Protocols, Email Security, Cybersecurity, Network Security, Security Software, Data Integrity, Multi-Factor Authentication, Firewall

Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Computing, Security Information and Event Management (SIEM), Cloud Deployment, Cloud Computing Architecture, Cloud Management, Secure Coding, Threat Detection, Cloud Solutions, Cloud Infrastructure, Network Security, Application Security, Data Security, Encryption, Event Monitoring, Security Testing, Cloud Applications, Data Encryption Standard