Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "encryption"
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
- Status: Free Trial
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Medical Privacy, Electronic Medical Record, Telehealth, Patient Safety, Health Technology, Health Information Management, Medical Equipment and Technology, Security Awareness, Cloud Security, Personally Identifiable Information, Encryption, Help Desk Support, Desktop Support, End User Training and Support, Health Care, Technical Support and Services, Decision Support Systems, Health Care Procedure and Regulation, Clinical Data Management, Patient Education and Support
- Status: Free Trial
Infosec
Skills you'll gain: Medical Privacy, Information Privacy, Data Governance, Security Management, Computer Security Incident Management, Personally Identifiable Information, Law, Regulation, and Compliance, Data Security, Governance, Information Assurance, Document Management, Security Controls, Threat Management, General Data Protection Regulation (GDPR), Compliance Management, Training Programs, Compliance Training, Incident Management, Regulation and Legal Compliance, Data Management
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Authentications, Security Strategy, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
University of Michigan
Skills you'll gain: Cyber Security Policies, Security Engineering, Information Systems Security, Computer Security Awareness Training, Security Awareness, Vulnerability, Policy Analysis, Political Sciences, Public Policies, Public Safety and National Security, Safety and Security, Human Factors, Human Computer Interaction, Usability
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Theoretical Computer Science
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Threat Modeling, Cybersecurity, Cryptography, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Algorithms
- Status: Free Trial
EIT Digital
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Embedded Software, Internet Of Things, Cryptography, Operating Systems, Security Requirements Analysis, Network Architecture, Network Security, Cybersecurity, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), Computer Networking, Computer Programming, System Requirements, Software Engineering, C (Programming Language), System Design and Implementation
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Arithmetic, Algorithms, Applied Mathematics, Probability, Computer Science
University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Authentications, Mobile Security, Data Integrity
Coursera Instructor Network
Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Data Loss Prevention, Security Controls, Regulatory Compliance, Compliance Management, Data Integrity, Security Strategy, Incident Response
In summary, here are 10 of our most popular encryption courses
- Cyber Security Fundamentals:Â University of London
- Asymmetric Cryptography and Key Management:Â University of Colorado System
- Healthcare IT Support:Â Johns Hopkins University
- Privacy Fundamentals:Â Infosec
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Securing Digital Democracy:Â University of Michigan
- Cryptography and Information Theory:Â University of Colorado System
- Blockchain Security:Â Infosec
- Development of Secure Embedded Systems:Â EIT Digital
- Mathematical Foundations for Cryptography:Â University of Colorado System