Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn career credentials while taking courses that count towards your Master’s degree.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.
Earn a university-issued career credential in a flexible, interactive format.

Level
Required

Duration
Required

Skills
Required

Subtitles
Required

Educator
Required

Results for "Cyber Security Cryptography Research"

  • New York University

    Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Mobile Security, Enterprise Security, Computer Security, Cyber Risk, Cyber Security Policies, Network Architecture, Security Controls

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science

  • Status: New AI skills

    Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Network Protocols, Cloud Security, Vulnerability Assessments, Network Architecture, Bash (Scripting Language), Operating Systems, Security Controls, Debugging, Python Programming

  • Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment

  • Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, Configuration Management, Cybersecurity, Security Management, Cyber Attacks, Computer Security Awareness Training, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Threat Detection, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Authentications, Data Security, Theoretical Computer Science, Algorithms, Digital Communications

What brings you to Coursera today?

  • University of London

    Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response

  • Status: New

    Skills you'll gain: Prompt Engineering, Generative AI, Data Wrangling, Large Language Modeling, Unit Testing, Supervised Learning, Feature Engineering, Keras (Neural Network Library), Deep Learning, ChatGPT, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Unsupervised Learning, Data Manipulation, PyTorch (Machine Learning Library), Artificial Intelligence, Data Import/Export, Data Ethics

  • Status: AI skills

    Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Threat Management, Vulnerability Scanning, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management

  • Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Cyber Security Strategy, Incident Response, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Ethical Standards And Conduct

  • Skills you'll gain: Cybersecurity, Cyber Attacks, Security Awareness, Hardening, Data Security, Computer Security Awareness Training, Network Security, Personally Identifiable Information, Information Systems Security, Security Controls, Threat Management, Malware Protection, Information Privacy, Encryption, Multi-Factor Authentication

  • Skills you'll gain: IT Service Management, Cloud Computing, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Computer Security Incident Management, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Data Ethics, Cyber Governance