Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic protocol"
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
University of Alberta
Skills you'll gain: Software Architecture, Model View Controller, Unified Modeling Language, Object Oriented Design, Service Oriented Architecture, API Design, Systems Architecture, Web Services, Software Design Patterns, Software Design, Simple Object Access Protocol (SOAP), Microservices, Restful API, Software Visualization, Code Review, Solution Architecture, Software Systems, Object Oriented Programming (OOP), Java, Software Development
University of California, Irvine
Skills you'll gain: Embedded Software, Embedded Systems, Debugging, C (Programming Language), Integrated Development Environments, Program Development, Development Environment, Computer Hardware, Computer Programming, Digital Communications, Open Source Technology
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
University of Colorado Boulder
Skills you'll gain: Algorithms, Data Structures, Graph Theory, Operations Research, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Computational Thinking, Pseudocode, Cryptography, Computer Science, Programming Principles, Encryption, Network Model, Linear Algebra, Combinatorics, Data Science, Advanced Mathematics, Mathematical Modeling, Design Strategies, Computer Programming
University at Buffalo
Skills you'll gain: Blockchain, Program Development, Secure Coding, Software Development, Development Environment, Web Development Tools, Software Design, Solution Design, Data Validation
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Data Security, Data Validation, User Accounts
University of California, Irvine
Skills you'll gain: Embedded Systems, Internet Of Things, General Networking, Operating Systems, Wireless Networks, Network Protocols, Computer Hardware, Emerging Technologies, System Design and Implementation, Software Design
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Threat Detection, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Encryption, Cyber Threat Intelligence, Incident Management, Information Systems Security, Threat Management
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls
University of California San Diego
Skills you'll gain: Graph Theory, Logical Reasoning, Cryptographic Protocols, Combinatorics, Computational Logic, Deductive Reasoning, Cryptography, Probability, Key Management, Computational Thinking, Encryption, Mathematical Theory & Analysis, Network Analysis, Public Key Cryptography Standards (PKCS), Algorithms, Theoretical Computer Science, Python Programming, Data Structures, Cybersecurity, Mathematical Modeling
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
In summary, here are 10 of our most popular cryptographic protocol courses
- Security Analyst Fundamentals:Â IBM
- Software Design and Architecture:Â University of Alberta
- The Arduino Platform and C Programming:Â University of California, Irvine
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- Foundations of Data Structures and Algorithms:Â University of Colorado Boulder
- Smart Contracts:Â University at Buffalo
- Blockchain Basics:Â University at Buffalo
- Introduction to the Internet of Things and Embedded Systems:Â University of California, Irvine
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Fundamentals of Computer Network Security:Â University of Colorado System