Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "secure protocols"
Skills you'll gain: Secure Coding, Application Security, DevSecOps, Security Testing, Software Development Methodologies, Software Configuration Management, Software Development Life Cycle, Software Testing, Threat Modeling, Cyber Security Assessment, Cloud Security, Agile Methodology, Process Driven Development, Verification And Validation, Risk Management Framework
The State University of New York
Skills you'll gain: Blockchain, Market Liquidity, FinTech, Financial Market, Financial Systems, Governance, Cryptography, Financial Services, Network Protocols, Digital Assets, Investments
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Threat Detection, Linux Administration, Linux
University of Colorado System
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Cryptographic Protocols, Application Security, Key Management, Public Key Cryptography Standards (PKCS), Secure Coding, Web Development, Email Security, PHP (Scripting Language), Data Integrity
Skills you'll gain: Blockchain, Secure Coding, Application Security, Software Design Patterns, Cybersecurity, Web Development Tools, Debugging, Object Oriented Programming (OOP), Application Development, Transaction Processing, Scalability
University of Colorado Boulder
Skills you'll gain: Internet Of Things, API Design, Amazon Web Services, Application Programming Interface (API), Network Protocols, Microservices, Cloud Applications, Cloud Platforms, Embedded Systems, Serverless Computing, Cybersecurity, Cloud Computing, Software Development, Wireless Networks
Skills you'll gain: Open Web Application Security Project (OWASP), Application Security, Threat Modeling, Secure Coding, DevSecOps, Encryption, Security Engineering, Security Testing, Security Software, Cryptography, Threat Management, Cloud Security, Risk Management Framework, DevOps, Cyber Engineering, Cloud API, Vulnerability Scanning, Security Management, Data Security, Threat Detection
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
University of Colorado System
Skills you'll gain: Requirements Analysis, User Requirements Documents, Requirements Elicitation, Agile Methodology, Functional Requirement, Software Documentation, System Requirements, Software Development Life Cycle, Agile Software Development, Waterfall Methodology, Technical Communication
In summary, here are 10 of our most popular secure protocols courses
- Secure Software Development:Â Packt
- Decentralized Exchange (Dex) Protocols & Platforms:Â The State University of New York
- Cyber Security Technologies:Â Illinois Tech
- Design and Analyze Secure Networked Systems:Â University of Colorado System
- Secure Networked System with Firewall and IDS:Â University of Colorado System
- Basic Cryptography and Programming with Crypto API:Â University of Colorado System
- Solidity Advanced: Secure Smart Contracts & DApp Development:Â Packt
- M2M & IoT Interface Design & Protocols for Embedded Systems:Â University of Colorado Boulder
- Fundamentals of Secure Software:Â Packt
- Fundamentals of Computer Network Security:Â University of Colorado System