Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic protocols"
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Application Security, Cryptography, Data Storage
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, General Networking, Network Performance Management, Computer Networking, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Data Integrity, Virtualization
Skills you'll gain: Blockchain, Digital Assets, FinTech, Plan Execution, Business Strategies, Business Strategy, Strategic Decision-Making, Payment Systems, Governance, Feasibility Studies, Financial Services, Financial Regulation, Work Breakdown Structure, Project Implementation, Market Opportunities, Financial Systems, Cryptography, Design, Emerging Technologies, Stakeholder Management
University of Colorado System
Skills you'll gain: Local Area Networks, Network Protocols, Computer Networking, Network Architecture, TCP/IP, Network Performance Management, Wireless Networks, Data Integrity
University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Infrastructure, Data Integrity
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications
University of Michigan
Skills you'll gain: Django (Web Framework), HTML and CSS, Model View Controller, Hypertext Markup Language (HTML), Application Deployment, Web Applications, Back-End Web Development, Web Servers, SQL, Databases, Network Protocols, Python Programming
Skills you'll gain: Blockchain, Digital Assets, FinTech, Financial Systems, Emerging Technologies, Payment Systems, Business Transformation, Distributed Computing, Security Assertion Markup Language (SAML), Identity and Access Management, Innovation, Contract Management, Business Process Automation, Automation
University of California San Diego
Skills you'll gain: Graph Theory, Logical Reasoning, Cryptographic Protocols, Combinatorics, Computational Logic, Deductive Reasoning, Cryptography, Probability, Computational Thinking, Encryption, Probability Distribution, Mathematical Theory & Analysis, Network Analysis, Public Key Cryptography Standards (PKCS), Algorithms, Theoretical Computer Science, Bayesian Statistics, Python Programming, Data Structures, Cybersecurity
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Network Security, Authorization (Computing), Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, Cyber Operations, DevSecOps, Cybersecurity, Cloud-Native Computing, Endpoint Detection and Response, Cyber Attacks, General Networking, TCP/IP, Zero Trust Network Access, Cryptography, Endpoint Security, Cyber Threat Intelligence, Malware Protection, Cloud Platforms, Firewall, Cloud Computing, Encryption, Security Information and Event Management (SIEM)
In summary, here are 10 of our most popular cryptographic protocols courses
- Networking and Security in iOS Applications:Â University of California, Irvine
- Computer Communications:Â University of Colorado System
- Blockchain Revolution in Financial Services:Â INSEAD
- Peer-to-Peer Protocols and Local Area Networks:Â University of Colorado System
- Classical Cryptosystems and Core Concepts:Â University of Colorado System
- Asymmetric Cryptography and Key Management:Â University of Colorado System
- Web Application Technologies and Django:Â University of Michigan
- Blockchain, Cryptoassets, and Decentralized Finance:Â INSEAD
- Introduction to Discrete Mathematics for Computer Science:Â University of California San Diego
- Enterprise and Infrastructure Security:Â New York University