Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptography & authentication"
Skills you'll gain: Azure Active Directory, Single Sign-On (SSO), Identity and Access Management, Authentications, Authorization (Computing), Active Directory, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), User Accounts, Security Controls, Cloud Services
Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Data Management, Digital Assets, Security Management, Threat Modeling, Vulnerability Assessments, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Data Security, Information Systems Security, Secure Coding, Key Management
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security
New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity
- Status: New
Skills you'll gain: Encryption, Public Key Infrastructure, Cryptography, Cryptographic Protocols, Data Security, Advanced Encryption Standard (AES), Cybersecurity, Data Encryption Standard, Network Security, Blockchain, Authentications, Data Integrity, Algorithms
University of Michigan
Skills you'll gain: Application Deployment, Django (Web Framework), Application Development, Web Development, Web Applications, Object-Relational Mapping, Database Design, Data Modeling, Authentications, User Accounts, Relational Databases
University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Algorithms
SkillUp EdTech
Skills you'll gain: Blockchain, Cryptography, Cybersecurity, Network Security, Information Systems Security, Key Management, Encryption, Data Integrity, Distributed Computing, Transaction Processing, Algorithms
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms
Coursera Project Network
Skills you'll gain: Cryptography, Encryption, Application Development, Security Engineering, C and C++
University at Buffalo
Skills you'll gain: Blockchain, Emerging Technologies, Distributed Computing, Microsoft Azure, FinTech, Cloud Computing Architecture, Platform As A Service (PaaS), Cryptography, Open Source Technology, Scalability, Data Storage, Information Privacy
In summary, here are 10 of our most popular cryptography & authentication courses
- Cybersecurity Identity and Access Solutions with Azure AD:Â Microsoft
- Certified Blockchain Security Professional (CBSP) Exam Prep:Â SkillUp EdTech
- Networking and Security in iOS Applications:Â University of California, Irvine
- Enterprise and Infrastructure Security:Â New York University
- Encryption and Cryptography Essentials:Â IBM
- Django Features and Libraries:Â University of Michigan
- Symmetric Cryptography:Â University of Colorado System
- Blockchain and Cryptography Overview:Â SkillUp EdTech
- Security Architecture and Engineering:Â Packt
- Asymmetric Cryptography and Key Management:Â University of Colorado System