Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This Specialization brings together three industry-aligned courses, Data Security and Information Privacy, Identity and Access Management (IAM), and Applied Cryptography to provide a complete toolkit for safeguarding digital information and controlling access in today’s interconnected world. As organisations face growing challenges around cybercrime, data breaches and compliance with global privacy regulations, the ability to secure sensitive data and manage digital identities has never been more critical.
In this program, you will learn how to evaluate and reduce risks to personal and organisational data, apply advanced privacy-preserving methods, and build systems that ensure confidentiality, integrity, and availability of information. You’ll gain hands-on experience in designing IAM frameworks that streamline user access while ensuring only authorised individuals can interact with critical assets. You will also explore the fundamentals and applications of cryptography, learning how encryption, public key infrastructure (PKI), and digital certificates are used to protect data at rest, in transit and in use.
Developed by Macquarie University’s Cyber Skills Academy, ranked in the top 1% of universities globally and Australia’s leading cyber security school, combining academic rigour with real-world application. By the end, you’ll have the skills to strengthen organisational resilience, enhance compliance, and protect digital trust in an era of constant cyber threats.
Syllabus
- Course 1: Cyber Security: Data Security and Information Privacy
- Course 2: Cyber Security: Identity Access Management and Authentication
- Course 3: Cyber Security: Applied Cryptography
Courses
-
This Cyber Security: Applied Cryptography course equips you with practical skills to apply cryptographic tools and technologies for real-world security challenges. You will gain capabilities to design, evaluate, and apply cryptographic solutions across enterprise and emerging technology contexts. By the end of this course, you will be able to: • Apply foundational cryptographic building blocks, including symmetric/asymmetric encryption and Public-Key Infrastructure (PKI). •Secure data at rest and in motion, using full-disk encryption and ensuring authenticity. • Utilize cryptography in network security protocols, VPNs, wireless systems, and anonymous browsing technologies like TOR. • Protect intellectual property, software integrity, and operate within secure hardware environments such as HSMs and Trusted Execution Environments. • Understand the cryptographic core of blockchain systems for distributed ledgers, smart contracts, and secure voting. • Prepare for future privacy-preserving technologies like Homomorphic Encryption, Federated Learning, Multi-Party Computation, and post-quantum cryptography. This course is for cyber security professionals, software engineers, or tech decision-makers. To be successful, you should have a basic understanding of computer networks and fundamental security concepts.
-
Data Security and Information Privacy | Protect Identities. Preserve Trust. Power Compliance. This course helps compliance leaders, analysts, data scientists, and tech professionals secure data and ensure privacy by design. Developed by the Cyber Skills Academy at Macquarie University, this program offers hands-on methods and technologies to manage data security and privacy in real-world environments. You'll gain critical skills in: * Identifying threats, risks, and vulnerabilities in information systems. * Evaluating privacy risk using metrics and de-identification models (k-anonymity, l-diversity, t-closeness). * Applying differential privacy techniques for provable privacy. * Linking datasets securely with privacy-preserving record linkage. * Using tools for data encryption, anonymisation, and secure sharing. * Applying standards like ABS Five Safes and NIST Privacy Framework for compliance. This course empowers you to embed privacy as a core data strategy, reducing organizational risk and building trust. To succeed, learners should have a basic understanding of data concepts and digital environments.
-
Cyber Security: Identity and Access Management (IAM) and Authentication | Design Trust. Control Access. Protect Everything. In an era where digital identity is at the centre of every security conversation, mastering Identity IAM is critical to protecting systems, data, and people. This course is your practical guide to building, managing, and securing authentication systems in modern enterprises. Own the Front Door of Enterprise Security Developed by Macquarie University’s Cyber Skills Academy, ranked in the top 1% of universities globally and recognised as Australia’s leading cyber security school, this course has been co-designed with industry partners to ensure every module reflects the realities of today’s threat landscape and workforce needs. From real-world case studies to implementation-ready tools, this course equips you with both the foundational knowledge and the technical skills to manage identity and access securely across cloud and on-prem environments. You’ll dive deep into: • IAM fundamentals and architecture design • Lifecycle processes like onboarding, provisioning, and recovery • Identity federation and Single Sign-On (SSO) • Two factor (2FA), multi-factor (MFA), and biometric authentication • Risk analysis, vulnerabilities, and threat mitigation in IAM systems • Modern passwordless authentication methods including FIDO2 and WebAuthn Secure Access, Everywhere Each topic has been carefully structured to move beyond theory, giving you hands-on, applicable knowledge that’s directly transferable to workplace environments. Whether you’re an IT professional, security leader, or aspiring IAM specialist, this course empowers you to confidently design and secure identity systems that protect organisations from evolving threats.
Taught by
Matt Bushby