Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure protocols"
The State University of New York
Skills you'll gain: Blockchain, Market Liquidity, FinTech, Financial Market, Financial Systems, Governance, Cryptography, Financial Services, Network Protocols, Digital Assets, Investments
- Status: Free
Yonsei University
Skills you'll gain: TCP/IP, Network Protocols, Network Routing, Network Security, General Networking, Intrusion Detection and Prevention, File Transfer Protocol (FTP), Dynamic Host Configuration Protocol (DHCP), Network Architecture, Network Analysis
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications
University of Colorado Boulder
Skills you'll gain: Internet Of Things, General Networking, Wireless Networks, Computer Networking, Automation, Network Protocols, Emerging Technologies, Information Systems Security, Cybersecurity, Operating Systems, Network Security, Encryption, Software Systems, Data Security, Cloud Platforms, Authentications
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
Skills you'll gain: IT Infrastructure, Information Systems Security, Computer Networking, Desktop Support, Systems Administration, Network Troubleshooting, Remote Access Systems, Network Security, OSI Models, Package and Software Management, Application Security, Cybersecurity, Disaster Recovery, User Accounts, File Systems, TCP/IP, Lightweight Directory Access Protocols, Computer Hardware, Technical Support, Software Installation
University of California, Irvine
Skills you'll gain: Embedded Systems, Internet Of Things, General Networking, Operating Systems, Wireless Networks, Network Protocols, Computer Hardware, Emerging Technologies, System Design and Implementation, Software Design
Coursera Project Network
Skills you'll gain: TCP/IP, Network Protocols, Network Monitoring, OSI Models, Network Security, Web Servers, Network Analysis
Skills you'll gain: Serverless Computing, Digital Transformation, Cloud Services, Data Ethics, Cloud Infrastructure, Google Cloud Platform, Application Programming Interface (API), Business Transformation, Applied Machine Learning, Hybrid Cloud Computing, Image Analysis, Infrastructure As A Service (IaaS), Cloud Computing, Public Cloud, Containerization, Cloud Computing Architecture, Multi-Cloud, Machine Learning, Software As A Service, Computer Vision
University of Michigan
Skills you'll gain: PHP (Scripting Language), Hypertext Markup Language (HTML), MySQL, Web Applications, Web Development, Secure Coding, Cascading Style Sheets (CSS), Development Environment, Back-End Web Development, Database Development, Web Servers, Data Validation
In summary, here are 10 of our most popular secure protocols courses
- Decentralized Exchange (Dex) Protocols & Platforms:Â The State University of New York
- Introduction to TCP/IP:Â Yonsei University
- Asymmetric Cryptography and Key Management:Â University of Colorado System
- Industrial IoT Markets and Security:Â University of Colorado Boulder
- Assets, Threats, and Vulnerabilities:Â Google
- Systems and Application Security:Â ISC2
- Secure Software Design:Â University of Colorado System
- Soporte de TecnologÃas de la Información de Google: Google
- Introduction to the Internet of Things and Embedded Systems:Â University of California, Irvine
- Wireshark for Beginners: TCP IP Protocol Fundamentals:Â Coursera Project Network