Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This Specialization brings together three industry-aligned courses, Data Security and Information Privacy, Identity and Access Management (IAM), and Applied Cryptography to provide a complete toolkit for safeguarding digital information and controlling access in today’s interconnected world. As organisations face growing challenges around cybercrime, data breaches and compliance with global privacy regulations, the ability to secure sensitive data and manage digital identities has never been more critical.
In this program, you will learn how to evaluate and reduce risks to personal and organisational data, apply advanced privacy-preserving methods, and build systems that ensure confidentiality, integrity, and availability of information. You’ll gain hands-on experience in designing IAM frameworks that streamline user access while ensuring only authorised individuals can interact with critical assets. You will also explore the fundamentals and applications of cryptography, learning how encryption, public key infrastructure (PKI), and digital certificates are used to protect data at rest, in transit and in use.
Developed by Macquarie University’s Cyber Skills Academy, ranked in the top 1% of universities globally and Australia’s leading cyber security school, combining academic rigour with real-world application. By the end, you’ll have the skills to strengthen organisational resilience, enhance compliance, and protect digital trust in an era of constant cyber threats.
Syllabus
- Course 1: Cyber Security: Data Security and Information Privacy
- Course 2: Cyber Security: Identity Access Management and Authentication
- Course 3: Cyber Security: Applied Cryptography
Courses
-
• Watch our course introduction video before you enroll! (copy and paste into browser) https://vimeo.com/1176025403 This Cyber Security: Applied Cryptography course equips you with practical skills to apply cryptographic tools and technologies for real-world security challenges. You will gain capabilities to design, evaluate, and apply cryptographic solutions across enterprise and emerging technology contexts. By the end of this course, you will be able to: • Apply foundational cryptographic building blocks, including symmetric/asymmetric encryption and Public-Key Infrastructure (PKI). •Secure data at rest and in motion, using full-disk encryption and ensuring authenticity. • Utilize cryptography in network security protocols, VPNs, wireless systems, and anonymous browsing technologies like TOR. • Protect intellectual property, software integrity, and operate within secure hardware environments such as HSMs and Trusted Execution Environments. • Understand the cryptographic core of blockchain systems for distributed ledgers, smart contracts, and secure voting. • Prepare for future privacy-preserving technologies like Homomorphic Encryption, Federated Learning, Multi-Party Computation, and post-quantum cryptography. This course is for cyber security professionals, software engineers, or tech decision-makers. To be successful, you should have a basic understanding of computer networks and fundamental security concepts.
-
• Watch our course introduction video before you enroll! (copy and paste into browser) https://vimeo.com/1176024308 Data Security and Information Privacy | Protect Identities. Preserve Trust. Power Compliance. This course helps compliance leaders, analysts, data scientists, and tech professionals secure data and ensure privacy by design. Developed by the Cyber Skills Academy at Macquarie University, this program offers hands-on methods and technologies to manage data security and privacy in real-world environments. You'll gain critical skills in: * Identifying threats, risks, and vulnerabilities in information systems. * Evaluating privacy risk using metrics and de-identification models (k-anonymity, l-diversity, t-closeness). * Applying differential privacy techniques for provable privacy. * Linking datasets securely with privacy-preserving record linkage. * Using tools for data encryption, anonymisation, and secure sharing. * Applying standards like ABS Five Safes and NIST Privacy Framework for compliance. This course empowers you to embed privacy as a core data strategy, reducing organizational risk and building trust. To succeed, learners should have a basic understanding of data concepts and digital environments.
-
• Watch our course introduction video before you enroll! (copy and paste into browser) https://vimeo.com/1176040828 Cyber Security: Identity and Access Management (IAM) and Authentication This course is for IT professionals, security leaders, and aspiring IAM specialists. Identity and Access Management (IAM) is critical for protecting digital systems, data, and users. This course offers practical guidance for building, managing, and securing authentication systems in modern enterprises. Co-designed with industry partners, it provides real-world case studies and tools for managing identity and access across cloud and on-prem environments. By the end of this course, you will be able to: • Understand IAM fundamentals and architecture design. • Implement lifecycle processes like onboarding, provisioning, and recovery. • Configure Identity federation and Single Sign-On (SSO). • Apply multi-factor (MFA) and biometric authentication methods. • Perform risk analysis and mitigate threats in IAM systems. • Implement modern passwordless authentication, including FIDO2 and WebAuthn. • Design and secure identity systems against evolving threats. You will gain practical experience with concepts applicable to tools like Azure AD, Okta, and AWS IAM. To succeed, you should have a basic understanding of IT concepts and network security. No prior IAM experience is required.
Taught by
Matt Bushby