All Results

Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Deployment, Cloud Security, Cloud Technologies, Cloud Infrastructure, Cloud Platforms, Cloud Engineering, Cloud Computing, Cloud Storage, Infrastructure As A Service (IaaS), Emerging Technologies, Cloud-Native Computing, Hybrid Cloud Computing, IBM Cloud, Virtual Machines, Serverless Computing, Microservices, DevOps

Google Quantum AI
Skills you'll gain: Quantum computing, Emerging Technologies, Hardware Architecture, Mathematical Software, Failure Analysis, Simulation and Simulation Software, Software Engineering Tools, Theoretical Computer Science, Mathematical Modeling, Simulations

Total Seminars
Skills you'll gain: Cryptographic Protocols, Public Key Infrastructure, Threat Detection, Cloud Security, IT Security Architecture, Network Security, Public Key Cryptography Standards (PKCS), Cryptography, Cloud Computing, Key Management, Cloud Infrastructure, Enterprise Architecture, Cloud Services, Virtualization, Security Engineering, Security Management, Data Management, Security Software, Security Awareness, TCP/IP

Skills you'll gain: User Story, Systems Development Life Cycle, Cloud Deployment, CI/CD, Software Development Life Cycle, Open Web Application Security Project (OWASP), Continuous Integration, Istio, Linux Commands, Software Architecture, Test Driven Development (TDD), Cloud Computing Architecture, Devops Tools, Restful API, Git (Version Control System), DevOps, Grafana, Software Engineering, Python Programming, Application Development
What brings you to Coursera today?

Fractal Analytics
Skills you'll gain: Computing Platforms, Cloud Computing, Information Technology, Cybersecurity, Theoretical Computer Science, Linear Algebra, Critical Thinking

Skills you'll gain: NoSQL, Extract, Transform, Load, Database Administration, Apache Spark, Data Warehousing, Web Scraping, Data Pipelines, Apache Hadoop, Database Architecture and Administration, Database Design, Database Management, Linux Commands, SQL, IBM Cognos Analytics, Data Store, Generative AI, Professional Networking, Python Programming, Data Analysis, Data Science

Multiple educators
Skills you'll gain: Unsupervised Learning, Supervised Learning, Machine Learning Methods, Model Training, Applied Machine Learning, Machine Learning Algorithms, Transfer Learning, Machine Learning, Jupyter, Data Ethics, Decision Tree Learning, Model Evaluation, Responsible AI, Tensorflow, Scikit Learn (Machine Learning Library), NumPy, Predictive Modeling, Deep Learning, Artificial Intelligence, Classification Algorithms

Skills you'll gain: DevSecOps, Event Monitoring, Cloud Security, Security Management, DevOps, Data Access, Cyber Security Policies, Server Administration, Data Governance, System Configuration, Token Optimization, Data Storage

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms