• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Encrypt Decrypt Data

Results for "encrypt/decrypt+data"


  • U

    University of Colorado System

    Fundamentals of Computer Network Security

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Application Security, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns

    4
    Rating, 4 out of 5 stars
    ·
    597 reviews

    Intermediate · Specialization · 3 - 6 Months

  • I

    Infosec

    Computer Forensics

    Skills you'll gain: Digital Forensics, File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, File Management, Operating Systems, Data Structures, General Networking, Data Validation, Record Keeping, Data Integrity, Data Storage, Data Analysis Software, User Accounts, USB, Ethical Standards And Conduct, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    345 reviews

    Intermediate · Specialization · 3 - 6 Months

  • I

    ISC2

    Security Operations

    Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    200 reviews

    Beginner · Course · 1 - 3 Months

  • U

    University of Colorado System

    Advanced System Security Design

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems

    4.5
    Rating, 4.5 out of 5 stars
    ·
    658 reviews

    Beginner · Specialization · 3 - 6 Months

  • E

    Erasmus University Rotterdam

    Cybersecurity in Healthcare (Hospitals & Care Centres)

    Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Information Privacy, Digital Communications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    399 reviews

    Beginner · Course · 1 - 3 Months

  • U

    Universidad de los Andes

    Ciberseguridad

    Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Digital Forensics, Security Requirements Analysis, Penetration Testing, Information Systems Security, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, Encryption, Cybersecurity, Vulnerability Management, Exploitation techniques, Data Security, Security Management, Personally Identifiable Information

    4.7
    Rating, 4.7 out of 5 stars
    ·
    535 reviews

    Beginner · Specialization · 1 - 3 Months

  • I

    Institut Mines-Télécom

    4G Network Fundamentals

    Skills you'll gain: Wireless Networks, Network Security, Network Architecture, Computer Networking, Mobile Security, Network Protocols, Telecommunications, Network Performance Management, Network Routing, Encryption, Capacity Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    134 reviews

    Intermediate · Course · 1 - 3 Months

  • U

    University of Colorado System

    Classical Cryptosystems and Core Concepts

    Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Cryptography Standards (PKCS), Brute-force attacks, Data Integrity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    425 reviews

    Beginner · Course · 1 - 4 Weeks

  • U

    Universidad de los Andes

    Principios y Regulaciones de Seguridad de la Información

    Skills you'll gain: Cryptography, Security Requirements Analysis, Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Cyber Security Policies, Information Assurance, General Data Protection Regulation (GDPR), Cybersecurity, Information Privacy, Security Awareness, Threat Detection, Cyber Risk, Human Factors, Authentications, Data Integrity, Authorization (Computing)

    4.8
    Rating, 4.8 out of 5 stars
    ·
    368 reviews

    Beginner · Course · 1 - 4 Weeks

  • M

    Microsoft

    Cybersecurity Threat Vectors and Mitigation

    Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication

    4.8
    Rating, 4.8 out of 5 stars
    ·
    316 reviews

    Beginner · Course · 1 - 3 Months

  • G

    Google Cloud

    Architecting with Google Kubernetes Engine: Workloads

    Skills you'll gain: Kubernetes, Cloud-Native Computing, Application Deployment, Scalability, Load Balancing, Cloud Infrastructure, Containerization, Data Persistence, Data Storage, Authorization (Computing), General Networking, Network Security, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.3K reviews

    Intermediate · Course · 1 - 3 Months

  • U

    University of California, Davis

    Secure Coding Practices

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    607 reviews

    Intermediate · Specialization · 3 - 6 Months

1…101112…36

In summary, here are 10 of our most popular encrypt/decrypt+data courses

  • Fundamentals of Computer Network Security: University of Colorado System
  • Computer Forensics: Infosec
  • Security Operations: ISC2
  • Advanced System Security Design: University of Colorado System
  • Cybersecurity in Healthcare (Hospitals & Care Centres): Erasmus University Rotterdam
  • Ciberseguridad: Universidad de los Andes
  • 4G Network Fundamentals: Institut Mines-Télécom
  • Classical Cryptosystems and Core Concepts: University of Colorado System
  • Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes
  • Cybersecurity Threat Vectors and Mitigation: Microsoft

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok