More to explore:

All Results

  • Skills you'll gain: Cyber Security Assessment, Cybersecurity, Exploitation techniques, Vulnerability Assessments, Persona Development, Coordination, Safety and Security, Record Keeping

  • Skills you'll gain: AI Security, LLM Application, Cyber Security Assessment, Large Language Modeling, Continuous Monitoring, Security Testing, Responsible AI, Threat Modeling, Vulnerability Assessments, Prompt Engineering, Security Controls, Vulnerability Scanning, Security Strategy, AI Personalization, Exploitation techniques, System Implementation

  • University of Colorado System

    Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

  • Skills you'll gain: LLM Application, Prompt Engineering, Penetration Testing, Vulnerability Assessments, Security Testing, Large Language Modeling, Vulnerability Management, Risking, AI Security, Application Security

  • Stanford University

    Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

What brings you to Coursera today?

  • Skills you'll gain: Computing Platforms, Cloud Computing, Information Technology, Cybersecurity, Linear Algebra, Critical Thinking

  • University of Colorado System

    Skills you'll gain: Cryptography, Brute-force attacks, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Information Assurance, Theoretical Computer Science, Threat Modeling, Communication Systems

  • Skills you'll gain: Quantum computing, Algorithms, Computer Hardware, IBM Cloud, Cryptography, Python Programming, Computer Programming, Software Documentation, Simulations

  • Skills you'll gain: Quantum computing, Public Key Cryptography Standards (PKCS), Cryptography, Data Structures, Cryptographic Protocols, Algorithms, Encryption, Theoretical Computer Science, Computer Science, Mathematical Software, Advanced Mathematics

  • Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity

  • Skills you'll gain: Crisis Management, Incident Response, ChatGPT, Computer Security Incident Management, Generative AI, AI Enablement, Cross-Functional Collaboration, Prompt Patterns, Prompt Engineering, Cybersecurity, Cyber Attacks, AI Personalization, Team Performance Management, AI Workflows, Scenario Testing, Hardening, Discussion Facilitation, Performance Analysis, Coordination