All Results

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Brute-force attacks, Algorithms

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Hardening, Computer Security, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Security Architecture Review, Application Specific Integrated Circuits, Cryptographic Protocols, Microarchitecture, Cryptography, Systems Design, Encryption, Exploitation techniques, Functional Design, Emerging Technologies

Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications
What brings you to Coursera today?

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Incident Management, Network Security, Authentications, Mobile Security, OSI Models, Security Controls, Configuration Management, Risk Analysis

Logical Operations
Skills you'll gain: Security Management, Information Systems Security, IT Security Architecture, Identity and Access Management, Security Architecture Review, Security Testing, Application Security, Asset Protection, Risk Management Framework, Cybersecurity, Security Controls, Risk Management, Data Security, Network Security, Infrastructure Security, Threat Modeling, Cloud Security, Incident Response, Cryptography, Network Monitoring

Macquarie University
Skills you'll gain: DevSecOps, Secure Coding, Cryptography, Application Security, Security Testing, IT Security Architecture, Cyber Threat Intelligence, Cyber Risk, Encryption, Network Security, AI Integrations, DevOps, Cybersecurity, CI/CD, Security Awareness, Cloud Security, Software Development, Security Controls, Artificial Intelligence and Machine Learning (AI/ML), Software Architecture

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms

Skills you'll gain: Cryptography, Encryption, Cybersecurity, Brute-force attacks, Python Programming, Key Management, Programming Principles, File I/O, Computational Logic, Program Development, Algorithms, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components, Data Structures, Application Development

University at Buffalo
Skills you'll gain: Blockchain, Test Driven Development (TDD), Cryptography, Development Testing, Test Script Development, Application Development, Transaction Processing, Emerging Technologies, Application Design, Application Frameworks, Cryptographic Protocols, Web Development Tools, Network Protocols, Program Development, Distributed Computing, Cloud Platforms, Computing Platforms, Development Environment, Integrated Development Environments, Programming Principles