Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic protocols"
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
- Status: Free Trial
University of California San Diego
Skills you'll gain: Clinical Trials, Clinical Research, Pharmaceuticals, Regulatory Affairs, Pharmacology, Medical Science and Research, Health Care Procedure and Regulation, Commercialization, Patient Safety
- Status: Free Trial
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Software Design, Programming Principles, Debugging, Program Development, Computer Programming, C (Programming Language), Software Development Methodologies
- Status: Free Trial
Skills you'll gain: Mainframe Computing, z/OS, Virtualization, Virtualization and Virtual Machines, Operating Systems, IBM Cloud, Hardware Architecture, Infrastructure Architecture, Enterprise Security, Computer Security, Computer Systems, Computer Hardware, Cryptography, System Configuration
Kennesaw State University
Skills you'll gain: Peer Review, Grammar, Business Writing, Business Correspondence, Writing, Writing and Editing, Editing, Proofreading, Concision, Taking Meeting Minutes, Professionalism, Business Communication, Report Writing, Administrative Support and Clerical Tasks, Target Audience, Communication, Constructive Feedback
- Status: Free Trial
University of Michigan
Skills you'll gain: Django (Web Framework), HTML and CSS, Model View Controller, Application Deployment, Application Frameworks, Web Applications, Web Servers, SQL, Databases, Network Protocols, Python Programming
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cyber Operations, Cryptography, Cyber Risk, Encryption, Authorization (Computing), Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Governance, Cyber Security Policies, Infrastructure Security, Security Awareness, Safety and Security, Identity and Access Management, Incident Management
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Internet Of Things, Application Programming Interface (API), TCP/IP, Electronics, Embedded Systems, Control Systems, USB, Networking Hardware, Electronic Systems, Hardware Design, Digital Communications, Computer Hardware, Computer Networking, Python Programming, Servers
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, Data Store, NoSQL, Operating Systems, Apache Cassandra, Cloud Computing, Systems Design, Apache Hadoop, Database Theory, Algorithms, Theoretical Computer Science, Scalability, C++ (Programming Language), Network Protocols
- Status: Free Trial
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Wireless Networks, Extensible Markup Language (XML)
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security
- Status: Free Trial
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
In summary, here are 10 of our most popular cryptographic protocols courses
- Cryptographic Hash and Integrity Protection:Â University of Colorado System
- Drug Development:Â University of California San Diego
- Principles of Secure Coding:Â University of California, Davis
- Introduction to Enterprise Computing:Â IBM
- Writing Professional Email and Memos (Project-Centered Course):Â Kennesaw State University
- Web Application Technologies and Django:Â University of Michigan
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Interfacing with the Raspberry Pi:Â University of California, Irvine
- Cloud Computing Concepts, Part 1:Â University of Illinois Urbana-Champaign
- Advanced System Security Topics:Â University of Colorado System