More to explore:

All Results

  • Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

  • Skills you'll gain: Quantum computing, Emerging Technologies, Hardware Architecture, Mathematical Software, Failure Analysis, Simulation and Simulation Software, Software Engineering Tools, Theoretical Computer Science, Mathematical Modeling, Simulations

  • Skills you'll gain: Cryptographic Protocols, Public Key Infrastructure, Threat Detection, Cloud Security, IT Security Architecture, Network Security, Public Key Cryptography Standards (PKCS), Cryptography, Cloud Computing, Key Management, Cloud Infrastructure, Enterprise Architecture, Cloud Services, Virtualization, Security Engineering, Security Management, Data Management, Security Software, Security Awareness, TCP/IP

  • Status: Top AI Program

    Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Payment Systems, FinTech, Public Key Cryptography Standards (PKCS), Key Management, Application Security, Digital Assets, Network Protocols, Transaction Processing, Data Storage, Process Analysis, Distributed Computing, Emerging Technologies, Scripting, Application Specific Integrated Circuits, Financial Policy, Financial Regulation

What brings you to Coursera today?

  • Skills you'll gain: Computing Platforms, Cloud Computing, Information Technology, Cybersecurity, Theoretical Computer Science, Linear Algebra, Critical Thinking

  • Skills you'll gain: Microarchitecture, Network Protocols, Hardware Architecture, Systems Architecture, Computer Architecture, Communication Systems, Transaction Processing, Performance Tuning, Digital Communications, Memory Management, Data Integrity

  • University of Colorado System

    Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

  • Skills you'll gain: Blockchain, Vulnerability Assessments, Cryptography, Cryptographic Protocols, Security Controls, Vulnerability Management, Security Engineering, Threat Management, Data Security, Cyber Threat Intelligence, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Scripting, Network Protocols, Regulatory Compliance, Financial Regulation, Scalability

  • Skills you'll gain: DevSecOps, Event Monitoring, Cloud Security, Security Management, DevOps, Data Access, Cyber Security Policies, Server Administration, Data Governance, System Configuration, Token Optimization, Data Storage

  • Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms