Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure protocols"
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
- Status: Free
Princeton University
Skills you'll gain: Blockchain, Cryptography, Encryption, Payment Systems, FinTech, Key Management, Digital Assets, Network Protocols, Cybersecurity, Transaction Processing, Distributed Computing, Emerging Technologies, Scripting, Financial Regulation, Public Affairs, Market Dynamics
Skills you'll gain: OSI Models, Network Security, Security Controls, General Networking, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Proxy Servers, Distributed Denial-Of-Service (DDoS) Attacks, Network Infrastructure, Network Architecture, Identity and Access Management
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
University of Colorado Boulder
Skills you'll gain: Internet Of Things, API Design, Amazon Web Services, Application Programming Interface (API), Network Protocols, Microservices, Cloud Applications, Cloud Platforms, Embedded Systems, Serverless Computing, Cybersecurity, Cloud Computing, Software Development, Wireless Networks
Skills you'll gain: Secure Coding, Application Security, DevSecOps, Security Testing, Software Development Methodologies, Software Configuration Management, Software Development Life Cycle, Software Testing, Threat Modeling, Cyber Security Assessment, Cloud Security, Agile Methodology, Process Driven Development, Verification And Validation, Risk Management Framework
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
University at Buffalo
Skills you'll gain: Blockchain, Test Driven Development (TDD), Cryptography, Application Development, Transaction Processing, Emerging Technologies, Application Frameworks, Web Development Tools, Software Architecture, Network Protocols, Web Applications, Program Development, Distributed Computing, Application Programming Interface (API), Cloud Platforms, Microsoft Azure, Secure Coding, Software Development, Development Environment, FinTech
University of California San Diego
Skills you'll gain: Graph Theory, Logical Reasoning, Cryptographic Protocols, Combinatorics, Computational Logic, Deductive Reasoning, Cryptography, Probability, Computational Thinking, Encryption, Mathematical Theory & Analysis, Network Analysis, Public Key Cryptography Standards (PKCS), Algorithms, Theoretical Computer Science, Python Programming, Data Structures, Cybersecurity, Computer Programming, Mathematical Modeling
In summary, here are 10 of our most popular secure protocols courses
- Hardware Security:Â University of Maryland, College Park
- Bitcoin and Cryptocurrency Technologies:Â Princeton University
- Network and Communications Security :Â ISC2
- IT Fundamentals for Cybersecurity:Â IBM
- M2M & IoT Interface Design & Protocols for Embedded Systems:Â University of Colorado Boulder
- Secure Software Development:Â Packt
- Advanced System Security Design:Â University of Colorado System
- Secure Coding Practices:Â University of California, Davis
- Network Security:Â ISC2
- Introduction to Applied Cryptography:Â University of Colorado System