More to explore:

All Results

  • Skills you'll gain: Mobile Security, Digital Forensics, Criminal Investigation and Forensics, Cyber Threat Intelligence, Cyber Security Strategy, Investigation, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Mobile Development, Model Training, Cyber Security Policies, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Data Security, Cyber Governance, Endpoint Security, Machine Learning Methods, iOS Development, Application Security

  • Skills you'll gain: Engineering Documentation, Biomedical Technology, Biomedical Engineering, Medical Devices, Engineering, Scientific, and Technical Instruments, Medical Equipment and Technology, Electronics, Electronics Engineering, Vital Signs, Medical Equipment, Technical Documentation, Engineering Plans And Specifications, Electronic Hardware, Technical Communication, Semiconductors, Materials science, Health Technology, Analytical Testing, Electronic Systems, Systems Design

  • Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity

  • Skills you'll gain: Digital Forensics, Malware Protection, Cybersecurity, Cyber Attacks, Network Security, Data Integrity, Network Analysis, Microsoft Windows, Mac OS, Linux Commands, Web Applications, File Systems

  • Northeastern University

    Skills you'll gain: Information Privacy, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Regulation and Legal Compliance, Emerging Technologies, Algorithms, Artificial Intelligence

  • Skills you'll gain: Convolutional Neural Networks, Keras (Neural Network Library), Image Analysis, Computer Vision, Data Preprocessing, Deep Learning, Artificial Neural Networks, Embeddings, Model Deployment, Application Deployment, Model Training, Classification Algorithms, Supervised Learning, Model Evaluation

What brings you to Coursera today?

  • Skills you'll gain: Compliance Training, Regulatory Compliance, Financial Regulation, Personally Identifiable Information, Workflow Management, Fraud detection, Financial Controls, Standard Operating Procedure, Event Monitoring, Data Validation, Financial Systems, Data Collection, Finance

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

  • Skills you'll gain: Multi-Factor Authentication, Authentications, Identity and Access Management, Security Controls, Security Awareness, Data Security, Safety and Security, Security Management, Human Factors (Security), Cyber Security Strategy

  • Skills you'll gain: Identity and Access Management, Cryptography, AWS Identity and Access Management (IAM), Data Security, Authentications, Threat Detection, Cybersecurity, Encryption, Network Security, Data Management, Azure Active Directory, Security Controls, Cyber Attacks, Cyber Security Strategy, Cyber Governance, Key Management, Security Management, Cyber Risk, Computer Security, Security Awareness

  • University of Maryland, College Park

    Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms