All Results

Macquarie University
Skills you'll gain: Mobile Security, Digital Forensics, Criminal Investigation and Forensics, Cyber Threat Intelligence, Cyber Security Strategy, Investigation, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Mobile Development, Model Training, Cyber Security Policies, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Data Security, Cyber Governance, Endpoint Security, Machine Learning Methods, iOS Development, Application Security

Indian Institute of Science
Skills you'll gain: Engineering Documentation, Biomedical Technology, Biomedical Engineering, Medical Devices, Engineering, Scientific, and Technical Instruments, Medical Equipment and Technology, Electronics, Electronics Engineering, Vital Signs, Medical Equipment, Technical Documentation, Engineering Plans And Specifications, Electronic Hardware, Technical Communication, Semiconductors, Materials science, Health Technology, Analytical Testing, Electronic Systems, Systems Design

Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, Cybersecurity, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Blockchain, Algorithms, Data Integrity

EC-Council
Skills you'll gain: Digital Forensics, Malware Protection, Cybersecurity, Cyber Attacks, Network Security, Data Integrity, Network Analysis, Microsoft Windows, Mac OS, Linux Commands, Web Applications, File Systems

Northeastern University
Skills you'll gain: Information Privacy, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Regulation and Legal Compliance, Emerging Technologies, Algorithms, Artificial Intelligence

Skills you'll gain: Convolutional Neural Networks, Keras (Neural Network Library), Image Analysis, Computer Vision, Data Preprocessing, Deep Learning, Artificial Neural Networks, Embeddings, Model Deployment, Application Deployment, Model Training, Classification Algorithms, Supervised Learning, Model Evaluation
What brings you to Coursera today?

Skills you'll gain: Compliance Training, Regulatory Compliance, Financial Regulation, Personally Identifiable Information, Workflow Management, Fraud detection, Financial Controls, Standard Operating Procedure, Event Monitoring, Data Validation, Financial Systems, Data Collection, Finance

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

Coursera
Skills you'll gain: Multi-Factor Authentication, Authentications, Identity and Access Management, Security Controls, Security Awareness, Data Security, Safety and Security, Security Management, Human Factors (Security), Cyber Security Strategy

Macquarie University
Skills you'll gain: Identity and Access Management, Cryptography, AWS Identity and Access Management (IAM), Data Security, Authentications, Threat Detection, Cybersecurity, Encryption, Network Security, Data Management, Azure Active Directory, Security Controls, Cyber Attacks, Cyber Security Strategy, Cyber Governance, Key Management, Security Management, Cyber Risk, Computer Security, Security Awareness

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms