Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure protocols"
University of Colorado Boulder
Skills you'll gain: Internet Of Things, Data Visualization, Data Storage, Embedded Software, Embedded Systems, Debugging, General Networking, Process Driven Development, Machine Learning Algorithms, Big Data, Wireless Networks, Computer Networking, Automation, Network Protocols, Emerging Technologies, Failure Analysis, Information Systems Security, Technical Communication, Apache Hadoop, Simulations
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
University of Michigan
Skills you'll gain: PHP (Scripting Language), Hypertext Markup Language (HTML), MySQL, Web Applications, Web Development, Secure Coding, Cascading Style Sheets (CSS), Development Environment, Back-End Web Development, Database Development, Web Servers, Data Validation
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Compliance Management, Compliance Training, Data Security, Health Care Procedure and Regulation, Data Governance, Incident Response
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
Coursera Project Network
Skills you'll gain: TCP/IP, Network Protocols, Network Monitoring, OSI Models, Network Security, Web Servers, Network Analysis
- Status: Free
University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Network Security, Authentications, Mobile Security, Data Integrity, Algorithms
University of California San Diego
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Algorithms, Theoretical Computer Science, Computational Thinking, Python Programming, Logical Reasoning
Johns Hopkins University
Skills you'll gain: Clinical Data Management, Data Quality, Quality Assurance, Clinical Trials, Data Cleansing, Data Management, Data Integrity, Microsoft Excel, Data Compilation, Data Collection, Data Sharing, Data Security, Patient Treatment, Continuous Monitoring
Qualcomm Academy
Skills you'll gain: Wireless Networks, Emerging Technologies, Internet Of Things, General Networking, Digital Communications, Data Security, Technology Strategies, Network Planning And Design, Network Infrastructure, Virtualization
Duke University
Skills you'll gain: Blockchain, FinTech, Interoperability, Payment Systems, Emerging Technologies, Financial Systems, Cryptography, Digital Assets, Finance, Banking, Financial Services, Governance
In summary, here are 10 of our most popular secure protocols courses
- Developing Industrial Internet of Things:Â University of Colorado Boulder
- Enterprise and Infrastructure Security:Â New York University
- Application Security for Developers and DevOps Professionals:Â IBM
- Building Web Applications in PHP:Â University of Michigan
- Privacy Law and Data Protection:Â University of Pennsylvania
- Introduction to Cybersecurity Essentials:Â IBM
- Wireshark for Beginners: TCP IP Protocol Fundamentals:Â Coursera Project Network
- Introduction to Applied Cryptography:Â University of London
- Number Theory and Cryptography:Â University of California San Diego
- Clinical Trials Data Management and Quality Assurance:Â Johns Hopkins University