Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cryptographic protocols"
University of California San Diego
Skills you'll gain: Clinical Trials, Clinical Research, Pharmaceuticals, Regulatory Affairs, Medical Science and Research, Regulatory Compliance, Patient Safety, Cross-Functional Collaboration
Google Cloud
Skills you'll gain: User Provisioning, User Accounts, Mobile Security, Security Controls, Identity and Access Management, Cloud Security, Single Sign-On (SSO), System Configuration, Google Workspace, Multi-Factor Authentication
- Status: [object Object]
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Productivity Software, Information Systems Security, Multi-Factor Authentication
Skills you'll gain: Network Troubleshooting, Data Storage, General Networking, Cloud Storage, Network Protocols, Local Area Networks, Network Architecture, Computer Networking, Network Administration, System Configuration, Network Infrastructure, TCP/IP, Microsoft Windows, Wireless Networks, Command-Line Interface
University of Leeds
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security, Authentications, Data Integrity
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, Network Protocols, Scripting, MySQL, Data Structures
Skills you'll gain: Cloud Computing Architecture, Wireless Networks, Cloud Computing, Internet Of Things, Cloud Platforms, Local Area Networks, Emerging Technologies, Network Architecture, Amazon Web Services, Infrastructure As A Service (IaaS), Network Protocols, Embedded Systems, Amazon Elastic Compute Cloud
University of Colorado Boulder
Skills you'll gain: Internet Of Things, Project Design, Machine Learning Algorithms, Failure Analysis, Product Planning, Debugging, Embedded Systems, Data Analysis, Data Processing, General Networking, Product Requirements, Model Based Systems Engineering, Computer Networking, Wireless Networks, File Systems, Data Storage Technologies, Network Protocols, Information Systems Security, Technical Communication, Simulation and Simulation Software
University of Alberta
Skills you'll gain: Software Architecture, Unified Modeling Language, Systems Architecture, Software Design, Software Visualization, Solution Architecture, Software Systems, Software Development, Software Documentation, Software Design Patterns, System Design and Implementation, Software Technical Review, Object Oriented Design, Maintainability, Scalability
University of Colorado System
Skills you'll gain: Routing Protocols, Network Routing, TCP/IP, Network Protocols, Network Architecture, Network Performance Management, Computer Networking, OSI Models, Local Area Networks, Algorithms
In summary, here are 10 of our most popular cryptographic protocols courses
- Drug Development:Â University of California San Diego
- Introduction to Cloud Identity:Â Google Cloud
- Microsoft IT Support Specialist:Â Microsoft
- Introduction to Networking and Storage:Â IBM
- An Introduction to Cryptography:Â University of Leeds
- Hardware Security:Â University of Maryland, College Park
- Strategies for Cloud Security Risk Management:Â Google Cloud
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- IoT (Internet of Things) Wireless & Cloud Computing Emerging Technologies:Â Yonsei University
- Developing Industrial Internet of Things:Â University of Colorado Boulder