Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Applied Cryptography, PKI, & Cloud Security

via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This course covers advanced cryptographic protocols, public key infrastructure, and cloud and virtualization security, three interconnected areas that define how modern IT environments protect data and identity. Covering approximately 4.5 hours of expert instruction, learners develop the skills to implement applied cryptography, manage PKI infrastructure, and secure cloud workloads and virtual environments. Learners benefit by understanding TLS, IPSec, and key management solutions, how to configure and validate digital certificates, how to apply the shared responsibility model, and how to secure IaaS, PaaS, and SaaS environments and hypervisor infrastructure. Online labs reinforce certificate management and cloud security configuration tasks. By the end of this course, learners will be able to implement advanced cryptographic solutions, manage a PKI environment, and apply security controls to cloud and virtual infrastructures.

Syllabus

  • Applied Cryptography & Data Protection
    • This chapter highlights data states, key protection, encryption concepts, certificate use, trust models, network layers, segmentation choices, access controls, proxy functions, tunneling security, and detection techniques.
  • PKI & Certificate Management
    • This chapter highlights data states, key protection, encryption concepts, certificate use, trust models, network layers, segmentation choices, access controls, proxy functions, tunneling security, and detection techniques.
  • Cloud Architecture & Virtualization
    • This chapter covers hardened public servers, common Internet attacks, container use, virtual machine hosting, cloud models, shared security roles, access scenarios, Docker operation, and instance awareness.
  • Securing Cloud Environments
    • This chapter covers hardened public servers, common Internet attacks, container use, virtual machine hosting, cloud models, shared security roles, access scenarios, Docker operation, and instance awareness.
  • Course Assignment

Taught by

Dan LaChance, Lyndon Williams, and Mike Meyers

Reviews

Start your review of Applied Cryptography, PKI, & Cloud Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.