Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic techniques"
- Status: Free
Northwestern University
Skills you'll gain: Image Analysis, Digital Communications, Computer Vision, Visualization (Computer Graphics), Electrical Engineering, Matlab, Color Theory, Applied Mathematics, Statistical Process Controls
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Security Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Cybersecurity, Application Security, Firewall, Web Applications, Network Security, Wireless Networks, Command-Line Interface, Microsoft Windows, Virtual Machines, SQL
Microsoft
Skills you'll gain: Microsoft Word, Microsoft 365, Microsoft PowerPoint, Microsoft Outlook, Proofreading, Document Management, Technical Documentation, Microsoft Windows, Presentations, Writing, Editing, Microsoft Excel
University of Washington
Skills you'll gain: Regression Analysis, Predictive Modeling, Supervised Learning, Statistical Modeling, Applied Machine Learning, Machine Learning Algorithms, Feature Engineering, Machine Learning, Statistical Methods, Dimensionality Reduction, Python Programming, Data Validation
Rutgers the State University of New Jersey
Skills you'll gain: Demand Planning, Forecasting, Supply Chain Planning, Sales Management, Time Series Analysis and Forecasting, Supply Chain Management, Estimation, Trend Analysis, Decision Making
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
- Status: Free
University of Amsterdam
Skills you'll gain: Lean Six Sigma, Data Visualization, Statistical Hypothesis Testing, Minitab, Regression Analysis, Probability Distribution, Statistical Methods, Data Analysis, Statistical Analysis, Analytics, Process Improvement, Quality Control, Variance Analysis
University of Pennsylvania
Skills you'll gain: Operations Management, Operational Efficiency, Process Analysis, Operational Performance Management, Process Improvement, Lean Methodologies, Workflow Management, Continuous Improvement Process, Capacity Planning, Quality Management, Business Workflow Analysis, Supply Chain Management, Inventory Management System, Statistical Process Controls, Process Flow Diagrams, Root Cause Analysis
DeepLearning.AI
Skills you'll gain: Image Analysis, Predictive Modeling, Risk Modeling, Data Processing, Artificial Intelligence, Classification And Regression Tree (CART), Applied Machine Learning, Computer Vision, Deep Learning, Natural Language Processing, Machine Learning, Radiology, Artificial Neural Networks, Probability & Statistics, Supervised Learning
Skills you'll gain: Puppet (Configuration Management Tool), CI/CD, Containerization, Infrastructure as Code (IaC), Docker (Software), Continuous Deployment, Continuous Integration, Kubernetes, Cloud Computing, DevOps, Infrastructure As A Service (IaaS), Cloud Services, Configuration Management, Continuous Monitoring, Scalability, Virtual Machines, Public Key Infrastructure, Automation, Regression Testing
EDHEC Business School
Skills you'll gain: Investment Management, Portfolio Management, Text Mining, Asset Management, Network Analysis, Data Visualization Software, Investments, Machine Learning Methods, Unstructured Data, Predictive Modeling, Web Scraping, Financial Management, Machine Learning, Financial Statements, Applied Machine Learning, Financial Market, Financial Modeling, Risk Analysis, Python Programming, Financial Analysis
University of Minnesota
Skills you'll gain: UI/UX Research, User Research, User Interface (UI) Design, Usability Testing, User Interface (UI), Prototyping, Usability, User Experience, User Centered Design, Graphic and Visual Design, Ideation, Web Content Accessibility Guidelines, Design, Human Computer Interaction, User Experience Design, Interaction Design, Qualitative Research, Design Reviews, Design Thinking, Conceptual Design
In summary, here are 10 of our most popular cryptographic techniques courses
- Fundamentals of Digital Image and Video Processing: Northwestern University
- Intermediate Ethical Hacking Techniques: Packt
- Work Smarter with Microsoft Word: Microsoft
- Machine Learning: Regression: University of Washington
- Supply Chain Planning: Rutgers the State University of New Jersey
- Introduction to Cyber Security: New York University
- Data Analytics for Lean Six Sigma: University of Amsterdam
- Introduction to Operations Management: University of Pennsylvania
- AI for Medical Diagnosis: DeepLearning.AI
- Configuration Management and the Cloud: Google