Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic protocol"
Illinois Tech
Skills you'll gain: Networking Hardware, General Networking, Computer Networking, Wireless Networks, Network Architecture, Network Protocols, Local Area Networks, TCP/IP, Network Infrastructure, Network Routers, OSI Models, Network Model, Network Analysis, System Configuration, Wide Area Networks, Network Switches, Dynamic Host Configuration Protocol (DHCP), Servers
University of Colorado System
Skills you'll gain: Cryptography, Cryptographic Protocols, Encryption, Information Systems Security, Cybersecurity, Computer Security, Theoretical Computer Science
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Security Engineering, Computer Security, Infrastructure Security, Information Systems Security, Cybersecurity, Data Security, Cryptography, Cryptographic Protocols, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Other Programming Languages, Algorithms
Duke University
Skills you'll gain: Loans, Blockchain, FinTech, Lending and Underwriting, Operational Risk, Scalability, Security Testing, Interoperability, Payment Systems, General Lending, Risk Management, Consumer Lending, Derivatives, Key Management, Credit Risk, Cryptography, Emerging Technologies, Financial Regulations, Digital Assets, Financial Systems
Duke University
Skills you'll gain: Blockchain, FinTech, Interoperability, Payment Systems, Emerging Technologies, Financial Systems, Cryptography, Digital Assets, Finance, Banking, Financial Services, Governance
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Role-Based Access Control (RBAC), Google Cloud Platform, Network Security, Cloud Computing Architecture, IT Automation, General Networking, Infrastructure Security, Security Controls, Infrastructure as Code (IaC), Virtualization
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Security, Vulnerability Management, Secure Coding, Cybersecurity, Authorization (Computing), Cryptography, System Configuration, Encryption, Software Design, SQL
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
University of Michigan
Skills you'll gain: Django (Web Framework), HTML and CSS, Model View Controller, Hypertext Markup Language (HTML), Application Deployment, Web Applications, Back-End Web Development, Web Servers, SQL, Databases, Network Protocols, Python Programming
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
In summary, here are 10 of our most popular cryptographic protocol courses
- Computer Networking:Â Illinois Tech
- Cryptography and Information Theory:Â University of Colorado System
- Blockchain Security:Â Infosec
- Decentralized Finance (DeFi): The Future of Finance:Â Duke University
- Decentralized Finance (DeFi) Infrastructure:Â Duke University
- Introduction to Security Principles in Cloud Computing:Â Google Cloud
- Cyber Attack Countermeasures:Â New York University
- OWASP Top 10 - Welcome and Risks 1-5:Â Infosec
- Cybersecurity Fundamentals:Â IBM
- Web Application Technologies and Django:Â University of Michigan