All Results

Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Cryptographic Protocols, Encryption, Authentications, Data Encryption Standard, Advanced Encryption Standard (AES), Key Management, Network Protocols, Email Security, Cybersecurity, Network Security, Security Software, Data Integrity, Multi-Factor Authentication, Firewall

University of Colorado Boulder
Skills you'll gain: Estimation, Electrical Engineering, Numerical Analysis, Linear Algebra, Physics, Angular, Applied Mathematics, Advanced Mathematics, Mathematical Modeling, Mechanics, Calculus, Differential Equations, Engineering Analysis, Physical Science

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

Skills you'll gain: Endpoint Detection and Response, Network Administration, Cryptographic Protocols, IT Security Architecture, Cloud Security, Data Loss Prevention, Cloud Deployment, Cyber Attacks, Security Controls, Infrastructure Security, Computer Security, Encryption, Cloud Computing, Authorization (Computing), Network Planning And Design, Identity and Access Management, System Configuration, Data Security, Authentications, Malware Protection

Skills you'll gain: Blockchain, Vulnerability Assessments, Cryptography, Cryptographic Protocols, Security Controls, Vulnerability Management, Security Engineering, Threat Management, Data Security, Cyber Threat Intelligence, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Scripting, Network Protocols, Regulatory Compliance, Financial Regulation, Scalability
What brings you to Coursera today?

Google Quantum AI
Skills you'll gain: Quantum computing, Emerging Technologies, Hardware Architecture, Mathematical Software, Failure Analysis, Simulation and Simulation Software, Software Engineering Tools, Theoretical Computer Science, Mathematical Modeling, Simulations

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

University of California San Diego
Skills you'll gain: Cryptographic Protocols, Cryptography, Key Management, Encryption, Cybersecurity, Arithmetic, Algorithms, Algebra, Python Programming

Pragmatic AI Labs
Skills you'll gain: Redis, Data Pipelines, Real Time Data, Data Store, Data Structures, Operational Databases, Rust (Programming Language), Docker (Software), Containerization, Transaction Processing, Scripting, Server Side, Performance Tuning, Performance Testing

Skills you'll gain: IBM Cloud, Cryptography, Cryptographic Protocols, Algorithms, Key Management, Python Programming, Linear Algebra, Program Development, Simulations, Software Installation, Development Environment, Application Frameworks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms