More to explore:

All Results

  • Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Deployment, Cloud Security, Cloud Technologies, Cloud Infrastructure, Cloud Platforms, Cloud Engineering, Cloud Computing, Cloud Storage, Infrastructure As A Service (IaaS), Emerging Technologies, Cloud-Native Computing, Hybrid Cloud Computing, IBM Cloud, Virtual Machines, Serverless Computing, Microservices, DevOps

  • Skills you'll gain: Quantum computing, Emerging Technologies, Hardware Architecture, Mathematical Software, Failure Analysis, Simulation and Simulation Software, Software Engineering Tools, Theoretical Computer Science, Mathematical Modeling, Simulations

  • Skills you'll gain: Cryptographic Protocols, Public Key Infrastructure, Threat Detection, Cloud Security, IT Security Architecture, Network Security, Public Key Cryptography Standards (PKCS), Cryptography, Cloud Computing, Key Management, Cloud Infrastructure, Enterprise Architecture, Cloud Services, Virtualization, Security Engineering, Security Management, Data Management, Security Software, Security Awareness, TCP/IP

  • Skills you'll gain: User Story, Systems Development Life Cycle, Cloud Deployment, CI/CD, Software Development Life Cycle, Open Web Application Security Project (OWASP), Continuous Integration, Istio, Linux Commands, Software Architecture, Test Driven Development (TDD), Cloud Computing Architecture, Devops Tools, Restful API, Git (Version Control System), DevOps, Grafana, Software Engineering, Python Programming, Application Development

What brings you to Coursera today?

  • Skills you'll gain: Computing Platforms, Cloud Computing, Information Technology, Cybersecurity, Theoretical Computer Science, Linear Algebra, Critical Thinking

  • Skills you'll gain: NoSQL, Extract, Transform, Load, Database Administration, Apache Spark, Data Warehousing, Web Scraping, Data Pipelines, Apache Hadoop, Database Architecture and Administration, Database Design, Database Management, Linux Commands, SQL, IBM Cognos Analytics, Data Store, Generative AI, Professional Networking, Python Programming, Data Analysis, Data Science

  • Multiple educators

    Skills you'll gain: Unsupervised Learning, Supervised Learning, Machine Learning Methods, Model Training, Applied Machine Learning, Machine Learning Algorithms, Transfer Learning, Machine Learning, Jupyter, Data Ethics, Decision Tree Learning, Model Evaluation, Responsible AI, Tensorflow, Scikit Learn (Machine Learning Library), NumPy, Predictive Modeling, Deep Learning, Artificial Intelligence, Classification Algorithms

  • Skills you'll gain: DevSecOps, Event Monitoring, Cloud Security, Security Management, DevOps, Data Access, Cyber Security Policies, Server Administration, Data Governance, System Configuration, Token Optimization, Data Storage

  • University of Colorado System

    Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

  • Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms