More to explore:

All Results

  • University of Maryland, College Park

    Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms

  • Skills you'll gain: Email Security, Cybersecurity, Hardening, Authorization (Computing), Cyber Attacks, Security Awareness, Security Controls, Threat Management, Encryption, Data Security, Identity and Access Management, Authentications, Application Security, Endpoint Security, Threat Detection, Cryptography, Malware Protection, Patch Management, Multi-Factor Authentication

  • Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity

  • Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, Data Security, Cryptography, Security Controls, Cryptographic Protocols

  • Skills you'll gain: Email Security, Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Hardening, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Authorization (Computing), Cyber Attacks, Information Technology, Cyber Security Strategy, Penetration Testing, Computer Security Incident Management

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

What brings you to Coursera today?

  • Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Incident Response, Security Controls, Information Privacy, Data Management, Computer Security Incident Management, Security Strategy, Threat Management, Threat Detection, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Data Infrastructure, Risk Management, Cybersecurity, Compliance Management, Encryption, Incident Management

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

  • Skills you'll gain: Cryptography, Encryption, Cybersecurity, Application Security, Brute-force attacks, Penetration Testing, Python Programming, Key Management, File I/O, Computational Logic, Program Development, Algorithms, Programming Principles, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components

  • Stanford University

    Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability

  • Birla Institute of Technology & Science, Pilani

    Skills you'll gain: Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Cryptographic Protocols, Encryption, Authentications, Data Encryption Standard, Advanced Encryption Standard (AES), Key Management, Network Protocols, Email Security, Cybersecurity, Network Security, Security Software, Data Integrity, Multi-Factor Authentication, Firewall

  • Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Computing, Security Information and Event Management (SIEM), Cloud Deployment, Cloud Computing Architecture, Cloud Management, Secure Coding, Threat Detection, Cloud Solutions, Cloud Infrastructure, Network Security, Application Security, Data Security, Encryption, Event Monitoring, Security Testing, Cloud Applications, Data Encryption Standard