Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic protocols"
University of Michigan
Skills you'll gain: Web Scraping, JSON, Network Protocols, Web Services, Restful API, Application Programming Interface (API), Extensible Markup Language (XML), Data Import/Export, Data Access, TCP/IP, Python Programming, Scripting, Hypertext Markup Language (HTML), Data Capture, Text Mining
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Threat Modeling, Cybersecurity, Cryptography, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Algorithms
University of Colorado System
Skills you'll gain: Local Area Networks, Network Protocols, Computer Networking, Network Architecture, TCP/IP, Network Performance Management, Wireless Networks, Telecommunications, Data Integrity
- Status: Free
Yonsei University
Skills you'll gain: TCP/IP, Network Protocols, Network Routing, Network Security, General Networking, Intrusion Detection and Prevention, File Transfer Protocol (FTP), Dynamic Host Configuration Protocol (DHCP), Network Architecture, System Configuration, Network Analysis
- Status: New
Skills you'll gain: OSI Models, Network Security, Security Controls, General Networking, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Telecommunications, Proxy Servers, Network Infrastructure, Intrusion Detection and Prevention, Remote Access Systems
University of Alberta
Skills you'll gain: Software Architecture, Unified Modeling Language, Systems Architecture, Software Design, Software Design Documents, Software Visualization, Solution Architecture, Software Systems, Software Development, Software Documentation, Software Design Patterns, Enterprise Architecture, Maintainability, Scalability
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Open Web Application Security Project (OWASP), Cyber Operations, Vulnerability Assessments, Security Information and Event Management (SIEM), Test Planning, Network Analysis, Data Integrity
Skills you'll gain: Blockchain, FinTech, Emerging Technologies, Cryptography, Digital Assets, Distributed Computing, Digital Transformation, Public Key Cryptography Standards (PKCS), Transaction Processing, Information Privacy, Governance, Network Security, Data Integrity, Financial Services
Duke University
Skills you'll gain: Blockchain, FinTech, Interoperability, Payment Systems, Emerging Technologies, Financial Systems, Cryptography, Market Liquidity, Financial Regulations, Digital Assets, Finance, Banking, Financial Services, Payment Processing, Derivatives, Transaction Processing, Governance
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Google Cloud Platform, Network Security, Cloud Infrastructure, Data Security, Cloud Computing Architecture, IT Automation, General Networking, Computer Networking, Cybersecurity, Infrastructure Security, Security Controls, Infrastructure as Code (IaC)
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Network Security, Digital Communications, Authentications, Data Integrity, Algorithms
In summary, here are 10 of our most popular cryptographic protocols courses
- Using Python to Access Web Data:Â University of Michigan
- Blockchain Security:Â Infosec
- Peer-to-Peer Protocols and Local Area Networks:Â University of Colorado System
- Introduction to TCP/IP:Â Yonsei University
- Network and Communications Security :Â ISC2
- Software Architecture:Â University of Alberta
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Introduction to Blockchain Technologies:Â INSEAD
- Decentralized Finance (DeFi) Infrastructure:Â Duke University
- Cyber Security Fundamentals:Â University of London