Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic security measures"
Skills you'll gain: Security Controls, Information Assurance, Cybersecurity, Risk Management Framework, Security Awareness, Cyber Governance, Security Management, Cyber Risk, Security Strategy, Personally Identifiable Information, Data Ethics, Data Integrity
- Status: Free
University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Authentications, Mobile Security, Data Integrity
Skills you'll gain: IT Infrastructure, Computer Networking, Desktop Support, Systems Administration, Network Troubleshooting, Remote Access Systems, Network Security, OSI Models, Hardening, Package and Software Management, Cybersecurity, Disaster Recovery, User Accounts, TCP/IP, Computer Security Awareness Training, Lightweight Directory Access Protocols, Computer Hardware, Technical Support, Software Installation, Help Desk Support
- Status: Free
West Virginia University
Skills you'll gain: Auditing, Loss Prevention, Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Cyber Operations, Investigation, Criminal Investigation and Forensics, Analytics, Specialized Accounting, Cyber Attacks, Security Awareness, Big Data, Accounting, Business Ethics, Compliance Reporting
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Cyber Risk, Security Strategy, Risk Management Framework, Human Factors
Workday
Skills you'll gain: Workday (Software), Business Process, Workflow Management, Business Reporting, System Configuration, Role-Based Access Control (RBAC), Enterprise Security, Organizational Structure, Data Access, Multi-Tenant Cloud Environments
ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Cybersecurity, Authentications, Email Security, Data Integrity, IT Security Architecture, Virtual Private Networks (VPN), Algorithms
New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity
University of California San Diego
Skills you'll gain: Graph Theory, Logical Reasoning, Combinatorics, Computational Logic, Deductive Reasoning, Cryptography, Probability, Key Management, Computational Thinking, Encryption, Network Analysis, Public Key Cryptography Standards (PKCS), Algorithms, Theoretical Computer Science, Python Programming, Data Structures, Cybersecurity, Arithmetic, Computer Programming, Mathematical Modeling
University of Pennsylvania
Skills you'll gain: Regression Analysis, Spreadsheet Software, Google Sheets, Financial Modeling, Microsoft Excel, Data Modeling, Forecasting, Risk Analysis, Probability & Statistics, Business Modeling, Statistical Analysis, Simulation and Simulation Software, Process Improvement and Optimization
- Status: Free
University of Virginia
Skills you'll gain: Branding, Brand Strategy, Brand Management, Personal Attributes, Digital Assets, Social Media, Personally Identifiable Information, Computer Security Awareness Training, Self-Awareness, Social Media Strategy, Information Privacy, Constructive Feedback
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Cyber Risk, Data Security, DevSecOps, Personally Identifiable Information, Cloud Management, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, NIST 800-53, General Data Protection Regulation (GDPR), Infrastructure as Code (IaC), Security Controls, Security Software, Cybersecurity, Identity and Access Management, Platform As A Service (PaaS)
In summary, here are 10 of our most popular cryptographic security measures courses
- Security Principles:Â ISC2
- Introduction to Applied Cryptography:Â University of London
- Soporte de TecnologÃas de la Información de Google: Google
- Forensic Accounting and Fraud Examination:Â West Virginia University
- Security Management and Governance:Â Royal Holloway, University of London
- Workday Basics Series:Â Workday
- Cryptography :Â ISC2
- Enterprise and Infrastructure Security:Â New York University
- Introduction to Discrete Mathematics for Computer Science:Â University of California San Diego
- Introduction to Spreadsheets and Models:Â University of Pennsylvania