• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Coursera Plus
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Secure Authentication
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "secure authentication "

    • G

      Google Cloud

      Cloud Security Risks: Identify and Protect Against Threats

      Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization

      4.4
      Rating, 4.4 out of 5 stars
      ·
      31 reviews

      Beginner · Course · 1 - 4 Weeks

    • E

      EIT Digital

      Development of Secure Embedded Systems

      Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Embedded Software, Internet Of Things, Cryptography, Operating Systems, Security Requirements Analysis, Network Architecture, Network Security, Cybersecurity, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), Computer Networking, Computer Programming, System Requirements, Software Engineering, C (Programming Language), System Design and Implementation

      4.3
      Rating, 4.3 out of 5 stars
      ·
      1.2K reviews

      Intermediate · Specialization · 3 - 6 Months

    • U

      University of Colorado System

      Applied Cryptography

      Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Authentications, Data Security, Theoretical Computer Science, Algorithms, Digital Communications

      4.6
      Rating, 4.6 out of 5 stars
      ·
      854 reviews

      Intermediate · Specialization · 3 - 6 Months

    • U

      University of Colorado System

      Cybersecurity for Business

      Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Malware Protection, Risk Management, Vulnerability Assessments, Enterprise Security

      4.7
      Rating, 4.7 out of 5 stars
      ·
      1.8K reviews

      Beginner · Specialization · 3 - 6 Months

    • U

      University of Colorado System

      Fundamentals of Computer Network Security

      Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Software Design Patterns

      4
      Rating, 4 out of 5 stars
      ·
      579 reviews

      Intermediate · Specialization · 3 - 6 Months

    • U

      University of Colorado System

      Advanced System Security Design

      Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Security Testing, Threat Detection, Threat Modeling, Cybersecurity, Geographic Information Systems

      4.5
      Rating, 4.5 out of 5 stars
      ·
      625 reviews

      Beginner · Specialization · 3 - 6 Months

    • U

      University of Colorado System

      Classical Cryptosystems and Core Concepts

      Skills you'll gain: Cryptography, Cybersecurity, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Data Integrity

      4.5
      Rating, 4.5 out of 5 stars
      ·
      411 reviews

      Beginner · Course · 1 - 4 Weeks

    • U

      University of Colorado System

      Asymmetric Cryptography and Key Management

      Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms

      4.6
      Rating, 4.6 out of 5 stars
      ·
      270 reviews

      Intermediate · Course · 1 - 4 Weeks

    • U

      University of Colorado System

      Cryptographic Hash and Integrity Protection

      Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications

      4.5
      Rating, 4.5 out of 5 stars
      ·
      87 reviews

      Intermediate · Course · 1 - 4 Weeks

    • U

      University of Colorado System

      Basic Cryptography and Programming with Crypto API

      Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Application Security, Public Key Cryptography Standards (PKCS), Secure Coding, Data Security, Web Development, Email Security, PHP (Scripting Language), Algorithms, User Provisioning

      4.5
      Rating, 4.5 out of 5 stars
      ·
      98 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: New
      New
      M

      Microsoft

      Security and Authentication

      Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, .NET Framework, Application Programming Interface (API), Encryption

      Beginner · Course · 1 - 4 Weeks

    • U

      University of Colorado System

      Advanced System Security Topics

      Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Wireless Networks, Extensible Markup Language (XML)

      4.6
      Rating, 4.6 out of 5 stars
      ·
      354 reviews

      Beginner · Course · 1 - 4 Weeks

    Searches related to secure authentication

    firebase authentication: build secure angular apps
    1…91011…88

    In summary, here are 10 of our most popular secure authentication courses

    • Cloud Security Risks: Identify and Protect Against Threats: Google Cloud
    • Development of Secure Embedded Systems: EIT Digital
    • Applied Cryptography: University of Colorado System
    • Cybersecurity for Business: University of Colorado System
    • Fundamentals of Computer Network Security: University of Colorado System
    • Advanced System Security Design: University of Colorado System
    • Classical Cryptosystems and Core Concepts: University of Colorado System
    • Asymmetric Cryptography and Key Management: University of Colorado System
    • Cryptographic Hash and Integrity Protection: University of Colorado System
    • Basic Cryptography and Programming with Crypto API: University of Colorado System

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok