Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic protocols"
- Status: New AI skills
Google
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Incident Response, Vulnerability Management, Computer Security Incident Management, Hardening, Stakeholder Communications, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Network Protocols, Cloud Security, Vulnerability Assessments, Bash (Scripting Language), Operating Systems, Security Controls, Debugging, Python Programming
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Authentications, Data Security, Theoretical Computer Science, Algorithms, Digital Communications
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
- Status: New AI skills
Google
Skills you'll gain: Computer Networking, Package and Software Management, Network Security, Network Troubleshooting, Systems Administration, Cloud Infrastructure, Network Administration, IT Infrastructure, TCP/IP, Information Systems Security, File Systems, Microsoft Windows, Desktop Support, Network Protocols, Lightweight Directory Access Protocols, Cybersecurity, Encryption, Computer Hardware, Technical Support, Software Installation
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Data Modeling, Programming Principles, Data Structures, Data Collection, Data Visualization Software, Data Manipulation, Computer Programming, Python Programming, Data Import/Export, Software Installation
Skills you'll gain: Linux Commands, Bash (Scripting Language), Shell Script, File Management, Unix Shell, Linux, File Systems, Unix Commands, Scripting, Linux Servers, Command-Line Interface, Linux Administration, Scripting Languages, Unix, Operating Systems, Network Protocols, OS Process Management, TCP/IP, Network Administration, Automation
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
Skills you'll gain: Field-Programmable Gate Array (FPGA), Electronics, Hardware Design, Application Specific Integrated Circuits, Electronics Engineering, Serial Peripheral Interface, Computational Logic, Electrical Engineering, Computer Architecture, Schematic Diagrams, Semiconductors, Electronic Hardware, Electronic Components, Internet Of Things, Programmable Logic Controllers, Low Voltage, Embedded Software, Electronic Systems, Network Protocols, Embedded Systems
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP)
University at Buffalo
Skills you'll gain: Blockchain, Test Driven Development (TDD), Cryptography, Application Development, Transaction Processing, Emerging Technologies, Integrated Development Environments, Software Architecture, Network Protocols, Encryption, Web Applications, Program Development, Distributed Computing, Application Programming Interface (API), Microsoft Azure, FinTech, Software Development, Cloud Computing Architecture, Development Environment, Web Development Tools
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Collaborative Software, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Information Systems Security, Multi-Factor Authentication
In summary, here are 10 of our most popular cryptographic protocols courses
- Google Cybersecurity:Â Google
- Cryptography I:Â Stanford University
- Applied Cryptography:Â University of Colorado System
- Introduction to Applied Cryptography:Â University of Colorado System
- Google IT Support:Â Google
- Python for Everybody:Â University of Michigan
- Hands-on Introduction to Linux Commands and Shell Scripting:Â IBM
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- Chip based VLSI design for Industrial Applications:Â L&T EduTech
- Security Analyst Fundamentals:Â IBM