• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Authentications
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "authentications"

    • U

      University of Maryland, College Park

      Hardware Security

      Skills you'll gain: Hardware Design, Security Engineering, Hardware Architecture, Computer Hardware, Threat Modeling, Cybersecurity, Security Controls, Application Specific Integrated Circuits, Cryptography, Intrusion Detection and Prevention, Encryption, System Design and Implementation

      4.3
      Rating, 4.3 out of 5 stars
      ·
      687 reviews

      Mixed · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      A

      Akamai Technologies, Inc.

      Akamai Customer Consulting and Support

      Skills you'll gain: Security Management, Network Troubleshooting, General Networking, File Management, Cascading Style Sheets (CSS), Computer Security Incident Management, Network Administration, Authentications, Query Languages, Operating Systems, Web Design and Development, User Accounts, Scripting Languages, Database Design, Animations, Data Manipulation, Data Structures, Python Programming, Software Development, Data Analysis

      4.7
      Rating, 4.7 out of 5 stars
      ·
      280 reviews

      Beginner · Professional Certificate · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      I

      IBM

      Encryption and Cryptography Essentials

      Skills you'll gain: Encryption, Public Key Infrastructure, Cryptography, Data Security, Cybersecurity, Key Management, Identity and Access Management, Authentications, Blockchain, Algorithms, Data Integrity

      4.9
      Rating, 4.9 out of 5 stars
      ·
      33 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      I

      IBM

      Django Application Development with SQL and Databases

      Skills you'll gain: Object-Relational Mapping, Django (Web Framework), SQL, Bootstrap (Front-End Framework), Full-Stack Web Development, Relational Databases, Back-End Web Development, Cloud Applications, Databases, Model View Controller, Application Deployment, IBM Cloud, Authentications, Data Modeling, Responsive Web Design, Application Development, Authorization (Computing), Content Management

      4.5
      Rating, 4.5 out of 5 stars
      ·
      331 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      P

      Palo Alto Networks

      Palo Alto Networks Cybersecurity Foundation

      Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Infrastructure Security, IT Security Architecture, Threat Detection, Zero Trust Network Access, Cloud Security, Firewall, Cryptography, Cloud Computing, Authentications, Software As A Service

      4.6
      Rating, 4.6 out of 5 stars
      ·
      509 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      G

      Google Cloud

      Google Workspace Security

      Skills you'll gain: Email Security, Google Workspace, Cloud Security, Security Management, Mobile Security, Authentications, Security Controls, Data Security, Application Security, Identity and Access Management, User Accounts, Multi-Factor Authentication

      4.7
      Rating, 4.7 out of 5 stars
      ·
      800 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of California, Davis

      Identifying Security Vulnerabilities

      Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Application Security, Encryption, Authentications, Data Security, Vulnerability Assessments, Web Applications, Data Validation

      4.7
      Rating, 4.7 out of 5 stars
      ·
      176 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      I

      ISC2

      Access Control Concepts

      Skills you'll gain: Authorization (Computing), Role-Based Access Control (RBAC), Security Controls, Identity and Access Management, Data Access, Scenario Testing, Security Management, User Provisioning, Authentications, Cyber Security Policies

      4.8
      Rating, 4.8 out of 5 stars
      ·
      148 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      A

      Association of International Certified Professional Accountants

      Understanding, Using, and Securing Crypto and Digital Assets

      Skills you'll gain: Digital Assets, Blockchain, Asset Management, Cybersecurity, Security Awareness, Security Controls, Multi-Factor Authentication, Authentications, Securities Trading, Financial Market, Financial Regulations, Regulatory Compliance

      4.7
      Rating, 4.7 out of 5 stars
      ·
      79 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      I

      Infosec

      Execution, persistence, privilege escalation and evasion

      Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Authorization (Computing), Command-Line Interface, Operating Systems

      4.5
      Rating, 4.5 out of 5 stars
      ·
      90 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Packt

      Security Fundamentals and Identity Management

      Skills you'll gain: Authentications, User Accounts, Threat Management, Cryptography, Identity and Access Management, Risk Management Framework, Encryption, Cybersecurity, Cyber Risk, Information Systems Security, Security Controls, Application Security, Personally Identifiable Information, Data Security, Multi-Factor Authentication, Network Security, Information Privacy, Authorization (Computing)

      4.8
      Rating, 4.8 out of 5 stars
      ·
      11 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of California, Irvine

      Personnel & Third-Party Security

      Skills you'll gain: Security Awareness, Vendor Management, Risk Management, Threat Management, Security Controls, Human Factors (Security), Cyber Security Strategy, Supplier Management, Cyber Risk, Asset Protection, Due Diligence, Training Programs

      4.8
      Rating, 4.8 out of 5 stars
      ·
      42 reviews

      Mixed · Course · 1 - 4 Weeks

    Searches related to authentications

    security and authentication
    authentication, e-commerce features & order management
    firebase authentication: build secure angular apps
    authentication, authorization, and identity with vault
    identity access management (iam) and secure authentication
    ajax next level: authentication, servers, projects & more
    user authentication: identity-aware proxy
    app dev: adding user authentication to your application - python
    1…8910…36

    In summary, here are 10 of our most popular authentications courses

    • Hardware Security: University of Maryland, College Park
    • Akamai Customer Consulting and Support: Akamai Technologies, Inc.
    • Encryption and Cryptography Essentials: IBM
    • Django Application Development with SQL and Databases: IBM
    • Palo Alto Networks Cybersecurity Foundation: Palo Alto Networks
    • Google Workspace Security: Google Cloud
    • Identifying Security Vulnerabilities: University of California, Davis
    • Access Control Concepts: ISC2
    • Understanding, Using, and Securing Crypto and Digital Assets: Association of International Certified Professional Accountants
    • Execution, persistence, privilege escalation and evasion: Infosec

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok