Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cryptographic protocol"
Duke University
Skills you'll gain: Object Oriented Programming (OOP), Data Structures, Java, Cryptography, Computer Programming, Algorithms, Encryption, Web Analytics and SEO, Web Servers, File Management, Software Development
- Status: New
Skills you'll gain: OSI Models, Network Security, Security Controls, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Proxy Servers, Distributed Denial-Of-Service (DDoS) Attacks, Network Infrastructure, Network Architecture, Network Monitoring, Authentications, Identity and Access Management
University of Michigan
Skills you'll gain: Blockchain, Emerging Technologies, FinTech, Market Dynamics, Digital Assets, Cryptography, Technical Analysis, Business Solutions, Business Analysis, Investments, Payment Systems, Algorithms, Distributed Computing
University at Buffalo
Skills you'll gain: Blockchain, Emerging Technologies, Distributed Computing, Cloud Platforms, Microsoft Azure, FinTech, Cloud Computing Architecture, Interoperability, Cryptography, Scalability, Data Storage, Information Privacy
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, General Networking, Computer Networking, Encryption, Innovation, Emerging Technologies, Hypertext Markup Language (HTML)
ConsenSys Academy
Skills you'll gain: Blockchain, Cryptography, Interoperability, Encryption, FinTech, Emerging Technologies, Distributed Computing, Digital Assets, Business Analysis, Systems Architecture, Transaction Processing
- Status: Free
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Security Engineering, Computer Security, Infrastructure Security, Information Systems Security, Cybersecurity, Data Security, Cryptography, Cryptographic Protocols, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Other Programming Languages, Algorithms
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: New
Skills you'll gain: Penetration Testing, Incident Response, Network Security, Intrusion Detection and Prevention, Cybersecurity, Computer Security Incident Management, Cyber Security Strategy, Application Security, Open Web Application Security Project (OWASP), Cyber Attacks, Information Systems Security, Identity and Access Management, Vulnerability Assessments, Cryptography, Secure Coding, Encryption, Risk Management Framework, Command-Line Interface, Hardening, Threat Management
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Application Security, Cryptography, Data Storage
Google - Spectrum Sharing
Skills you'll gain: Public Key Infrastructure, Wireless Networks, Technical Communication, Software Installation, Key Management, Infrastructure Security, Network Infrastructure, System Implementation, Digital Communications, System Configuration, Network Troubleshooting, Record Keeping, Data Entry, Data Validation
University of Alberta
Skills you'll gain: Service Oriented Architecture, API Design, Web Services, Simple Object Access Protocol (SOAP), Microservices, Restful API, Software Architecture, Web Applications, JSON, Systems Architecture, Java
In summary, here are 10 of our most popular cryptographic protocol courses
- Java Programming: Arrays, Lists, and Structured Data:Â Duke University
- Network and Communications Security :Â ISC2
- Blockchain and Cryptocurrency Explained:Â University of Michigan
- Blockchain Platforms:Â University at Buffalo
- Internet History, Technology, and Security:Â University of Michigan
- Blockchain: Foundations and Use Cases:Â ConsenSys Academy
- Blockchain Security:Â Infosec
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- CompTIA Security+ Certification (SY0-701): The Total Course:Â Packt
- Networking and Security in iOS Applications:Â University of California, Irvine