Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic protocols"
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, NoSQL, Operating Systems, Apache Cassandra, Cloud Computing, Systems Design, Data Storage Technologies, Apache Hadoop, Database Theory, Algorithms, Theoretical Computer Science, Scalability, C++ (Programming Language), Network Protocols
- Status: Free Trial
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Wireless Networks, Extensible Markup Language (XML)
- Status: Free Trial
Rice University
Skills you'll gain: Apache Kafka, Apache Spark, Apache Hadoop, Distributed Computing, Java Programming, Dataflow, Java, Software Architecture, Systems Architecture, Data Structures, System Programming, Programming Principles, Servers, Application Frameworks, Algorithms, Performance Tuning, Network Protocols, Computer Science, Functional Design, Scalability
- Status: Free Trial
University of Washington
Skills you'll gain: Proposal Writing, Business Writing, Taking Meeting Minutes, Business Correspondence, Meeting Facilitation, Setting Appointments, Management Reporting, Business Reporting, Writing, Oral Expression, Business Communication, English Language, Office Procedures, Verbal Communication Skills, Oral Comprehension, Telephone Skills, Vocabulary, Scheduling
- Status: Free Trial
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Cyber Governance, Security Awareness
- Status: Free Trial
Skills you'll gain: Mainframe Computing, z/OS, Virtualization, Virtualization and Virtual Machines, IBM Cloud, Infrastructure Architecture, Computer Architecture, Enterprise Security, Computer Systems, Computer Hardware, Cryptography, Transaction Processing, System Configuration
- Status: Free Trial
University of Alberta
Skills you'll gain: Software Architecture, Unified Modeling Language, Systems Architecture, Software Design, Software Visualization, Solution Architecture, Software Systems, Software Development, Software Documentation, Service Oriented Architecture, Software Design Patterns, Enterprise Architecture, Maintainability, Application Deployment, Scalability, Databases
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Internet Of Things, Application Programming Interface (API), TCP/IP, Electronics, Control Systems, Embedded Systems, USB, Networking Hardware, Electronic Systems, Hardware Design, Digital Communications, Computer Hardware, Python Programming, Servers
- Status: Free Trial
University of Michigan
Skills you'll gain: Django (Web Framework), HTML and CSS, Model View Controller, Application Deployment, Application Frameworks, Web Applications, Cascading Style Sheets (CSS), Web Servers, SQL, Databases, Network Protocols, Python Programming
- Status: Free Trial
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Vulnerability Assessments, Application Security, Data Security, Security Controls, Software Design, C and C++, Vulnerability Management, Authorization (Computing), Java, Linux, Programming Principles, Debugging, Cybersecurity
- Status: Preview
Kennesaw State University
Skills you'll gain: Peer Review, Grammar, Business Writing, Business Correspondence, Writing, Writing and Editing, Editing, Proofreading, Concision, Taking Meeting Minutes, Professionalism, Business Communication, Report Writing, Administrative Support and Clerical Tasks, Target Audience, Communication, Constructive Feedback
In summary, here are 10 of our most popular cryptographic protocols courses
- Cryptographic Hash and Integrity Protection:Â University of Colorado System
- Cloud Computing Concepts, Part 1:Â University of Illinois Urbana-Champaign
- Advanced System Security Topics:Â University of Colorado System
- Parallel, Concurrent, and Distributed Programming in Java:Â Rice University
- Business English: Meetings:Â University of Washington
- Cybersecurity Policy Foundations:Â Infosec
- Introduction to Enterprise Computing:Â IBM
- Software Architecture:Â University of Alberta
- Interfacing with the Raspberry Pi:Â University of California, Irvine
- Web Application Technologies and Django:Â University of Michigan