• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Encrypt Decrypt Data

Results for "encrypt/decrypt+data"


  • I

    ISC2

    Security Operations

    Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    200 reviews

    Beginner · Course · 1 - 3 Months

  • L

    LearnKartS

    CompTIA Security+ Certification Preparation

    Skills you'll gain: Computer Security Incident Management, Vulnerability Management, Cyber Security Strategy, Cyber Governance, Incident Response, Cyber Threat Intelligence, Encryption, Cyber Attacks, Governance Risk Management and Compliance, Threat Detection, Security Strategy, Mobile Security, Business Risk Management, Cyber Security Policies, Cyber Security Assessment, Compliance Management, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    48 reviews

    Beginner · Specialization · 1 - 3 Months

  • M

    Microsoft

    Essential Aspects of Software, Hardware, and Data Backup

    Skills you'll gain: Cybersecurity, Application Security, Information Systems Security, Software Installation, System Configuration, Data Management, Computer Hardware, Data Security, Hardware Architecture, Data Storage, Information Technology Operations, Microsoft Windows, Firewall, Disaster Recovery, Encryption, Role-Based Access Control (RBAC), Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    157 reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    Institut Mines-Télécom

    5G Network Fundamentals

    Skills you'll gain: Wireless Networks, Network Architecture, Network Planning And Design, Virtual Networking, Network Security, Emerging Technologies, Communication Systems, Cloud Services, Network Protocols, Telecommunications, Interoperability, Authentications, Encryption, Authorization (Computing)

    4.6
    Rating, 4.6 out of 5 stars
    ·
    115 reviews

    Intermediate · Course · 1 - 3 Months

  • N

    New York University

    Cyber Attack Countermeasures

    Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication

    4.7
    Rating, 4.7 out of 5 stars
    ·
    710 reviews

    Intermediate · Course · 1 - 4 Weeks

  • U

    University of Colorado System

    Advanced System Security Topics

    Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Encryption, Data Security, Network Security, Information Systems Security, Web Components, Public Key Infrastructure, Wireless Networks

    4.6
    Rating, 4.6 out of 5 stars
    ·
    377 reviews

    Beginner · Course · 1 - 4 Weeks

  • U

    University of Colorado System

    Applied Cryptography

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms

    4.6
    Rating, 4.6 out of 5 stars
    ·
    917 reviews

    Intermediate · Specialization · 3 - 6 Months

  • I

    Infosec

    Digital Forensics Concepts

    Skills you'll gain: Digital Forensics, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, General Networking, Record Keeping, Data Integrity, File Management, Ethical Standards And Conduct, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    267 reviews

    Intermediate · Course · 1 - 3 Months

  • E

    Erasmus University Rotterdam

    Cybersecurity in Healthcare (Hospitals & Care Centres)

    Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Information Privacy, Digital Communications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    399 reviews

    Beginner · Course · 1 - 3 Months

  • U

    University of Colorado System

    Classical Cryptosystems and Core Concepts

    Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Cryptography Standards (PKCS), Brute-force attacks, Data Integrity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    425 reviews

    Beginner · Course · 1 - 4 Weeks

  • U

    Universidad de los Andes

    Principios y Regulaciones de Seguridad de la Información

    Skills you'll gain: Cryptography, Security Requirements Analysis, Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Cyber Security Policies, Information Assurance, General Data Protection Regulation (GDPR), Cybersecurity, Information Privacy, Security Awareness, Threat Detection, Cyber Risk, Human Factors, Authentications, Data Integrity, Authorization (Computing)

    4.8
    Rating, 4.8 out of 5 stars
    ·
    368 reviews

    Beginner · Course · 1 - 4 Weeks

  • U

    University of Colorado System

    Fundamentals of Computer Network Security

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Application Security, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns

    4
    Rating, 4 out of 5 stars
    ·
    597 reviews

    Intermediate · Specialization · 3 - 6 Months

1…101112…36

In summary, here are 10 of our most popular encrypt/decrypt+data courses

  • Security Operations: ISC2
  • CompTIA Security+ Certification Preparation: LearnKartS
  • Essential Aspects of Software, Hardware, and Data Backup: Microsoft
  • 5G Network Fundamentals: Institut Mines-Télécom
  • Cyber Attack Countermeasures: New York University
  • Advanced System Security Topics: University of Colorado System
  • Applied Cryptography: University of Colorado System
  • Digital Forensics Concepts: Infosec
  • Cybersecurity in Healthcare (Hospitals & Care Centres): Erasmus University Rotterdam
  • Classical Cryptosystems and Core Concepts: University of Colorado System

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok