More to explore:

All Results

  • Skills you'll gain: Blockchain, Application Deployment, Software Development Tools, Application Development, Go (Programming Language), Development Environment, Computer Programming Tools, Business Logic, Software Development, Program Development, Digital Assets, FinTech, Virtual Machines, Transaction Processing, Distributed Computing, Cryptography, Emerging Technologies, Encryption, Business Analysis, Market Dynamics

  • University at Buffalo

    Skills you'll gain: Blockchain, Test Driven Development (TDD), Cryptography, Development Testing, Test Script Development, Application Development, Transaction Processing, Emerging Technologies, Application Design, Application Frameworks, Cryptographic Protocols, Web Development Tools, Network Protocols, Program Development, Distributed Computing, Cloud Platforms, Computing Platforms, Development Environment, Integrated Development Environments, Programming Principles

  • Skills you'll gain: Blockchain, Digital Assets, FinTech, Business Transformation, Business Leadership, Governance, Cryptography, Financial Inclusion, Business Analysis, Organizational Structure, Strategic Leadership, Public Key Infrastructure, Emerging Technologies, Plan Execution, Solution Design, Payment Systems, Entrepreneurship, Cryptographic Protocols, Financial Systems, Market Opportunities

  • University of Colorado System

    Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Brute-force attacks, Algorithms

  • Skills you'll gain: Real-Time Operating Systems, Embedded Software, Embedded Systems, System Software, Software Architecture, Computer Engineering, Hardware Architecture, Systems Architecture, Build Tools, Dependency Analysis, Cross Platform Development, Linux, Software Design Patterns, C++ (Programming Language)

  • Skills you'll gain: Rust (Programming Language), LLM Application, Amazon Bedrock, Cross Platform Development, AI Workflows, AI Integrations, Event-Driven Programming, TypeScript, Software Architecture, Application Deployment, Natural Language Processing, Artificial Intelligence, Memory Management, Command-Line Interface

What brings you to Coursera today?

  • Skills you'll gain: Blockchain, Threat Modeling, Scripting Languages, Scripting, Cryptography, Application Security, Cryptographic Protocols, Scalability, FinTech, Payment Systems, Secure Coding, Software Development, Emerging Technologies, Distributed Computing, Software Development Tools, Computer Programming, Transaction Processing, Business Analysis, Market Dynamics, Finance

  • University of Colorado System

    Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Key Management, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications

  • University of Colorado System

    Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms

  • Skills you'll gain: Blockchain, User Interface (UI), Bootstrap (Front-End Framework), User Interface (UI) Design, Development Environment, Debugging, Frontend Integration, Full-Stack Web Development, Animations, Web Applications, Test Tools, Unit Testing, FinTech, Application Development, Javascript, Emerging Technologies, Virtual Machines, Software Testing, Integrated Development Environments, Other Programming Languages

  • University at Buffalo

    Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Cryptographic Protocols, Network Protocols, Distributed Computing, Virtual Environment, Data Integrity, Virtual Machines, Algorithms, Verification And Validation

  • Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity Planning, Cryptography, Encryption, Business Continuity, Disaster Recovery, Data Management, Security Engineering, Digital Assets, Threat Modeling, Vulnerability Assessments, Security Architecture Review, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Asset Protection, Vulnerability Management, Data Security