Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic protocol"
University of Colorado Boulder
Skills you'll gain: Theoretical Computer Science, Algorithms, Data Structures, Graph Theory, Operations Research, Public Key Cryptography Standards (PKCS), Computational Logic, Cryptography, Computational Thinking, Pseudocode, Design Strategies, Combinatorics, Programming Principles, Computer Programming, Computer Science, Encryption, Network Model, Linear Algebra, Analysis, Mathematical Modeling
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Data Integrity, Security Testing, Cybersecurity, Patch Management, Authorization (Computing), Network Security, Cryptography, Extensible Markup Language (XML), System Configuration, Scripting, Encryption, Software Design
University of Colorado System
Skills you'll gain: Local Area Networks, Network Protocols, Computer Networking, Network Architecture, TCP/IP, Network Performance Management, Wireless Networks, Data Integrity
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Skills you'll gain: Blockchain, Cryptography, Design, Emerging Technologies, Stakeholder Management, Distributed Computing, Financial Services, Public Key Cryptography Standards (PKCS), Information Privacy, Technical Consulting, Governance
University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Encryption, Data Sharing, Public Key Infrastructure, Transaction Processing, Key Management, Distributed Computing, Data Integrity, Network Model, Authentications, Emerging Technologies, Payment Systems, Digital Assets, Scalability, FinTech, Network Security, Data Structures, Version Control, Data Storage Technologies
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Duke University
Skills you'll gain: Financial Modeling, Blockchain, FinTech, Entrepreneurial Finance, Financial Market, Business Valuation, Risk Management, Excel Formulas, Market Data, Emerging Technologies, Cryptography, Risk Analysis, Fundraising and Crowdsourcing, Financial Analysis, Due Diligence, Probability Distribution, Investments, Private Equity, Financial Regulation, Financial Data
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cryptographic Protocols, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Security Testing, Data Security, Cybersecurity, Vulnerability Management, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
University of Alberta
Skills you'll gain: Service Oriented Architecture, API Design, Web Services, Simple Object Access Protocol (SOAP), Microservices, Restful API, Software Architecture, Web Applications, JSON, Systems Architecture, Java
In summary, here are 10 of our most popular cryptographic protocol courses
- Foundations of Data Structures and Algorithms:Â University of Colorado Boulder
- OWASP Top 10 - 2021:Â Infosec
- Peer-to-Peer Protocols and Local Area Networks:Â University of Colorado System
- Cyber Attack Countermeasures:Â New York University
- Introduction to Blockchain for Financial Services:Â INSEAD
- Blockchain:Â University of California, Irvine
- International Cyber Conflicts:Â The State University of New York
- Entrepreneurial Finance: Strategy and Innovation:Â Duke University
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Cybersecurity Fundamentals:Â IBM