Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic protocols"
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Network Protocols, Professional Networking, Vulnerability Assessments, Bash (Scripting Language), Operating Systems, Security Controls, Debugging, Interviewing Skills, Python Programming
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Data Modeling, Programming Principles, Data Structures, Data Collection, Data Visualization Software, Data Manipulation, Computer Programming, Python Programming, Data Import/Export, Software Installation
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Authentications, Data Security, Theoretical Computer Science, Algorithms, Digital Communications
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms
Skills you'll gain: Linux Commands, Bash (Scripting Language), Shell Script, File Management, Linux, File Systems, Unix Commands, Scripting, Linux Servers, Command-Line Interface, Linux Administration, Scripting Languages, Unix, Operating Systems, Network Protocols, OS Process Management, TCP/IP, Network Administration, Automation, Software Installation
Microsoft
Skills you'll gain: CI/CD, GitHub, C# (Programming Language), HTML and CSS, Load Balancing, Continuous Integration, Git (Version Control System), Role-Based Access Control (RBAC), Scalability, Object Oriented Programming (OOP), Authentications, ASP.NET, Full-Stack Web Development, Web Development, Debugging, SQL, Application Deployment, Microsoft Azure, Microsoft Copilot, Graph Theory
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Governance, Data Security, Data Migration, Database Design, Data Literacy, Descriptive Statistics, Extract, Transform, Load, Data Mining, Cloud Storage, Data Visualization Software, Data Store, IBM DB2, Data Management, Relational Databases, MySQL, Excel Formulas
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, Peripheral Devices, Configuration Management, Cybersecurity, Computing Platforms, Cloud Security, Cloud Technologies, Cloud Infrastructure, Cloud Platforms, Network Protocols, Cloud Hosting
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Collaborative Software, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Information Systems Security, Multi-Factor Authentication
- Status: Free
Princeton University
Skills you'll gain: Blockchain, Cryptography, Encryption, Payment Systems, FinTech, Application Security, Digital Assets, Network Protocols, Data Mining, Transaction Processing, Data Storage, Distributed Computing, Emerging Technologies, Scripting, Public Affairs, Market Dynamics
University of Colorado Boulder
Skills you'll gain: Theoretical Computer Science, Algorithms, Data Structures, Graph Theory, Operations Research, Public Key Cryptography Standards (PKCS), Computational Thinking, Computer Programming, Computational Logic, Cryptography, Computer Science, Pseudocode, Programming Principles, Data Encryption Standard, Applied Mathematics, Advanced Mathematics, Mathematical Theory & Analysis, Tree Maps, Encryption, Network Model
In summary, here are 10 of our most popular cryptographic protocols courses
- Google Cybersecurity:Â Google
- Python for Everybody:Â University of Michigan
- Applied Cryptography:Â University of Colorado System
- Cryptography I:Â Stanford University
- Hands-on Introduction to Linux Commands and Shell Scripting:Â IBM
- Microsoft Full-Stack Developer:Â Microsoft
- IBM Data Management:Â IBM
- Introduction to Applied Cryptography:Â University of Colorado System
- IBM and ISC2 Cybersecurity Specialist:Â ISC2
- Microsoft IT Support Specialist:Â Microsoft