Filter by
The language used throughout the course, in both instruction and assessments.
Results for "cryptographic protocols"
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
University of Colorado Boulder
Skills you'll gain: Internet Of Things, Cloud Computing Architecture, Amazon Web Services, Application Security, Application Programming Interface (API), Microservices, Embedded Systems, Network Protocols, Cloud Technologies, Cybersecurity, Cloud Computing, Serial Peripheral Interface, Wireless Networks, Wide Area Networks
Board Infinity
Skills you'll gain: Blockchain, Cryptographic Protocols, Cryptography, Encryption, Transaction Processing, Authentications, Public Key Infrastructure, Information Privacy, Data Security, Emerging Technologies, Data Integrity, Algorithms
University of California, Irvine
Skills you'll gain: Blockchain, Data Sharing, Cryptography, Transaction Processing, Distributed Computing, Network Model, FinTech, Emerging Technologies, Encryption, Digital Assets, Scalability, Data Structures, Version Control, Data Validation, Ideation
Duke University
Skills you'll gain: Blockchain, FinTech, Interoperability, Payment Systems, Emerging Technologies, Financial Systems, Cryptography, Digital Assets, Finance, Banking, Financial Services, Governance
University of Colorado System
Skills you'll gain: Digital Communications, OSI Models, Network Protocols, TCP/IP, Network Routing, Network Architecture, Network Planning And Design, Computer Networking, System Programming, Application Programming Interface (API), Data Integrity
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Software Design, Programming Principles, Debugging, Program Development, C (Programming Language), Software Development Methodologies
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Threat Detection, Linux Administration, Linux
- Status: Free
Skills you'll gain: Systems Analysis, Verification And Validation, Computational Logic, Systems Design, Data Modeling, Programming Principles, Data Validation, Software Design, Software Architecture, Theoretical Computer Science, Network Protocols, Algorithms
University of California San Diego
Skills you'll gain: Session Initiation Protocols, Android Development, Android Studio, Internet Of Things, Network Protocols, Wireless Networks, Mobile Development, Digital Communications, Embedded Systems, Open Source Technology
In summary, here are 10 of our most popular cryptographic protocols courses
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- M2M & IoT Interface Design & Protocols for Embedded Systems: University of Colorado Boulder
- Deep Dive into Cryptography: Board Infinity
- The Blockchain System: University of California, Irvine
- Decentralized Finance (DeFi) Infrastructure: Duke University
- Fundamentals of Network Communication: University of Colorado System
- Design and Analyze Secure Networked Systems: University of Colorado System
- Principles of Secure Coding: University of California, Davis
- Cyber Security Technologies: Illinois Tech
- Secure Networked System with Firewall and IDS: University of Colorado System