More to explore:

All Results

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • Status: Free Trial

    Skills you'll gain: Python Programming, Algorithms, Computer Programming, Theoretical Computer Science, Linear Algebra, Mathematics and Mathematical Modeling, Computer Science, Algebra, Object Oriented Programming (OOP), IBM Cloud, Scripting, Probability, Artificial Intelligence and Machine Learning (AI/ML), Data Processing, Mathematical Modeling, Data Structures, Data Manipulation, Probability & Statistics, Applied Mathematics, Software Installation

  • Status: Free Trial

    University of Colorado Boulder

    Skills you'll gain: Estimation, Electrical Engineering, Numerical Analysis, Linear Algebra, Physics, Angular, Applied Mathematics, Advanced Mathematics, Mathematical Modeling, Mechanics, Calculus, Differential Equations, Engineering Analysis, Physical Science, Probability

  • Status: Preview

    Stanford University

    Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability

  • University of Maryland, College Park

    Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms

What brings you to Coursera today?

  • Status: Free Trial

    Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity

  • Status: Preview

    Skills you'll gain: Computing Platforms, Cloud Computing, Information Technology, Cybersecurity, Linear Algebra, Critical Thinking

  • Status: Free Trial

    University of California San Diego

    Skills you'll gain: Cryptographic Protocols, Cryptography, Key Management, Encryption, Cybersecurity, Arithmetic, Algorithms, Algebra, Python Programming

  • Status: Free Trial

    Skills you'll gain: Blockchain, Key Management, Public Key Infrastructure, Security Controls, Cryptography, Cybersecurity, Data Security, Application Security, Network Security, Security Architecture Review, IT Security Architecture, Vulnerability Assessments, Encryption, Secure Coding, Cryptographic Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Public Key Cryptography Standards (PKCS), Security Testing, Vulnerability Management, Solution Design

  • Status: Free Trial

    Skills you'll gain: Quantum computing, Public Key Cryptography Standards (PKCS), Cryptography, Data Structures, Cryptographic Protocols, Algorithms, Encryption, Theoretical Computer Science, Computer Science, Mathematical Software, Advanced Mathematics

  • Status: Free Trial

    Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Security Engineering, Threat Modeling, Threat Management, Cyber Security Assessment, Security Controls, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Regulatory Compliance, Network Protocols, Financial Regulation, Scalability, Scripting