All Results
Status: Free TrialUniversity of Colorado Boulder
Skills you'll gain: Quantum computing, Public Key Cryptography Standards (PKCS), Cryptography, Data Structures, Cryptographic Protocols, Algorithms, Encryption, Theoretical Computer Science, Computer Science, Mathematical Software, Advanced Mathematics
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Cryptography Standards (PKCS), Data Integrity
Status: Free TrialSkills you'll gain: Quantum computing, Algorithms, Computer Hardware, IBM Cloud, Cryptography, Python Programming, Computer Programming, Software Documentation, Simulations
Status: Free TrialUniversity of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Public Key Infrastructure, Key Management, Transaction Processing, Authentications, Data Security, Information Privacy, Data Integrity
Status: Free TrialUniversity of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Data Integrity, Encryption, Cryptographic Protocols, FinTech, Transaction Processing, Data Structures, Verification And Validation
Status: FreePrinceton University
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Payment Systems, FinTech, Public Key Cryptography Standards (PKCS), Key Management, Application Security, Digital Assets, Network Protocols, Transaction Processing, Data Storage, Process Analysis, Distributed Computing, Emerging Technologies, Scripting, Application Specific Integrated Circuits, Financial Policy, Financial Regulation
What brings you to Coursera today?
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science
Status: Free TrialUniversity of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, Data Store, NoSQL, Apache Cassandra, Cloud Computing, Systems Design, Cloud Computing Architecture, Database Theory, Algorithms, Scalability, C++ (Programming Language)
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications
Status: Free TrialUniversity of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, FinTech, Data Sharing, Public Key Infrastructure, Transaction Processing, Key Management, Fraud detection, Distributed Computing, Payment Systems, Data Integrity, Network Model, Emerging Technologies, Digital Assets, Authentications, Data Security, Information Privacy, Digital Transformation
Status: Free TrialSkills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation
Status: Free TrialUniversity of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, File Systems, Cloud Computing, Dataflow, Transaction Processing, Computer Security, Software Systems, Data Centers, Cyber Security Policies, Authorization (Computing), Apache Hadoop, Data Store, Database Theory, Cloud Security, Authentications, NoSQL, Algorithms, Encryption, Graph Theory