All Results

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Brute-force attacks, Algorithms

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Hardening, Computer Security, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Security Architecture Review, Application Specific Integrated Circuits, Cryptographic Protocols, Microarchitecture, Cryptography, Systems Design, Encryption, Exploitation techniques, Functional Design, Emerging Technologies

Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications
What brings you to Coursera today?

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Incident Management, Network Security, Authentications, Mobile Security, OSI Models, Security Controls, Configuration Management, Risk Analysis

Macquarie University
Skills you'll gain: DevSecOps, Secure Coding, Cryptography, Application Security, Security Testing, IT Security Architecture, Cyber Threat Intelligence, Cyber Risk, Encryption, Network Security, AI Integrations, DevOps, Cybersecurity, CI/CD, Security Awareness, Cloud Security, Software Development, Security Controls, Artificial Intelligence and Machine Learning (AI/ML), Software Architecture

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Operating System Administration, Vulnerability Assessments, Encryption, Threat Detection, Cybersecurity

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms

Skills you'll gain: Cryptography, Encryption, Cybersecurity, Brute-force attacks, Python Programming, Key Management, Programming Principles, File I/O, Computational Logic, Program Development, Algorithms, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components, Data Structures, Application Development

Macquarie University
Skills you'll gain: Identity and Access Management, Cryptography, AWS Identity and Access Management (IAM), Data Security, Authentications, Threat Detection, Cybersecurity, Encryption, Network Security, Data Management, Azure Active Directory, Security Controls, Cyber Attacks, Cyber Security Strategy, Cyber Governance, Key Management, Security Management, Cyber Risk, Computer Security, Security Awareness