All Results

University of Colorado System
Skills you'll gain: Cryptography, Arithmetic, Algorithms, Applied Mathematics, Probability, Computer Science

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Theoretical Computer Science, Mathematics and Mathematical Modeling, Applied Mathematics, Algorithms, Cryptography, Data Management

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

Skills you'll gain: Prompt Engineering, Prompt Patterns, ChatGPT, Generative AI, Responsible AI, Generative Model Architectures, IBM Cloud, AI Workflows, LLM Application, Workflow Management, AI literacy, No-Code Development, Machine Learning Software, Natural Language Processing, Business Workflow Analysis, Artificial Intelligence, Self Service Technologies, Machine Learning, Deep Learning, Data Science

University of Pittsburgh
Skills you'll gain: Statistical Analysis, NumPy, Probability Distribution, Matplotlib, Plot (Graphics), Statistics, Data Science, Probability & Statistics, Probability, Statistical Modeling, Predictive Modeling, Data Analysis, Linear Algebra, Predictive Analytics, Statistical Methods, Mathematics and Mathematical Modeling, Applied Mathematics, Python Programming, Machine Learning, Logical Reasoning
What brings you to Coursera today?

University of London
Skills you'll gain: Computational Logic, Algorithms, Arithmetic, Applied Mathematics, Advanced Mathematics, Mathematics and Mathematical Modeling, Deductive Reasoning, Mathematical Theory & Analysis, Trigonometry, Geometry, Statistics, General Mathematics, Graphing, Computer Science, Mathematical Modeling, Programming Principles, Business Mathematics, Business Logic, Algebra, Problem Solving

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Data Analysis, Computational Logic, Integral Calculus, Trigonometry, Linear Algebra, Engineering Analysis, Logical Reasoning, Deductive Reasoning, Probability & Statistics, Statistical Analysis, Calculus, Statistical Methods, Analysis, Advanced Mathematics, Bayesian Statistics, Statistical Inference, Theoretical Computer Science, Mathematics and Mathematical Modeling, Numerical Analysis, Descriptive Analytics

Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis

University of Colorado Boulder
Skills you'll gain: Probability, Statistical Inference, Estimation, Probability & Statistics, Statistical Methods, Probability Distribution, Statistics, Bayesian Statistics, Markov Model, Statistical Analysis, Sampling (Statistics), Applied Mathematics, Artificial Intelligence, Machine Learning Methods, Generative AI, Data Analysis, Correlation Analysis, Data Science, Machine Learning Algorithms, Mathematical Theory & Analysis

University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, ISO/IEC 27001, Threat Management, Cyber Governance, Risk Management Framework, Computer Security, Information Assurance, Security Controls, Enterprise Security, Data Integrity

Starweaver
Skills you'll gain: Threat Detection, Endpoint Security, Hardening, Firewall, Cybersecurity, Network Security, Cyber Attacks, Cyber Security Strategy, Cyber Operations, Authorization (Computing), Security Controls, Network Monitoring, Data Security, Identity and Access Management