• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Authentications
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "authentications"

    • Status: Preview
      Preview
      I

      Institut Mines-Télécom

      5G Network Fundamentals

      Skills you'll gain: Virtualization, Network Architecture, Network Security, Service Oriented Architecture, Telecommunications, Wireless Networks, Computer Networking, Network Infrastructure, Network Protocols, Interoperability, Network Performance Management, Emerging Technologies, Authentications, Encryption

      4.6
      Rating, 4.6 out of 5 stars
      ·
      101 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      L

      LearnQuest

      Securing Linux Systems

      Skills you'll gain: Virtual Private Networks (VPN), Public Key Infrastructure, Linux Administration, Linux, Linux Servers, Firewall, Authorization (Computing), Authentications, Identity and Access Management, Security Controls, File Management, Remote Access Systems, System Monitoring, Cybersecurity, Data Storage Technologies, User Accounts, Intrusion Detection and Prevention, Encryption, Information Technology

      4.5
      Rating, 4.5 out of 5 stars
      ·
      111 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Design and Analyze Secure Networked Systems

      Skills you'll gain: Public Key Infrastructure, Application Security, Cybersecurity, Network Security, Information Assurance, Cyber Attacks, Risk Management Framework, Computer Security, Cryptography, Data Security, Threat Modeling, Security Controls, Key Management, Data Integrity, Encryption, Authorization (Computing), Vulnerability Assessments, Authentications

      3.9
      Rating, 3.9 out of 5 stars
      ·
      228 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of California, Davis

      Exploiting and Securing Vulnerabilities in Java Applications

      Skills you'll gain: Security Strategy, Authentications, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Vulnerability Scanning, Vulnerability Assessments, Security Testing, Authorization (Computing), Security Controls, Java, Vulnerability Management, Code Review, Java Programming, JSON, Patch Management, Dependency Analysis

      4.4
      Rating, 4.4 out of 5 stars
      ·
      65 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      G

      Google Cloud

      Developing Applications with Google Cloud 日本語版

      Skills you'll gain: Application Deployment, Prompt Engineering, Containerization, Google Cloud Platform, Cloud Infrastructure, Cloud Applications, Cloud Development, Docker (Software), Kubernetes, Cloud-Native Computing, Cloud API, Infrastructure As A Service (IaaS), Generative AI, Cloud Services, Authentications, Identity and Access Management, Cloud Computing, Virtual Machines, Cloud Storage, Debugging

      4.5
      Rating, 4.5 out of 5 stars
      ·
      732 reviews

      Intermediate · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      W

      Whizlabs

      Manage Identities and Governance in Azure

      Skills you'll gain: Azure Active Directory, Identity and Access Management, Microsoft Azure, User Provisioning, Role-Based Access Control (RBAC), Data Governance, Active Directory, User Accounts, Authorization (Computing), Single Sign-On (SSO), Cloud Computing, Cloud Security, Authentications, Multi-Factor Authentication

      4.1
      Rating, 4.1 out of 5 stars
      ·
      74 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      G

      Google Cloud

      Architecting with Google Kubernetes Engine 日本語版

      Skills you'll gain: Kubernetes, Prompt Engineering, Google Cloud Platform, Cloud Infrastructure, Containerization, Infrastructure As A Service (IaaS), Generative AI, CI/CD, Identity and Access Management, Cloud Services, Cloud Storage, Cloud Computing, Virtual Machines, Role-Based Access Control (RBAC), Application Deployment, Application Development, Authentications, Scalability, Load Balancing, Network Infrastructure

      4.5
      Rating, 4.5 out of 5 stars
      ·
      718 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      G

      Google Cloud

      Security in Google Cloud 日本語版

      Skills you'll gain: Prompt Engineering, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Cloud Infrastructure, Cloud Security, Identity and Access Management, Kubernetes, Infrastructure As A Service (IaaS), Data Loss Prevention, Generative AI, Cloud Services, Authentications, Vulnerability Assessments, Application Security, Cloud Management, Cloud Storage, Cloud Computing, Virtual Machines, Containerization, Threat Management

      4.5
      Rating, 4.5 out of 5 stars
      ·
      707 reviews

      Intermediate · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      R

      Royal Holloway, University of London

      Cyber Security – Technology and Governance

      Skills you'll gain: Incident Response, Network Security, Computer Security Incident Management, Risk Management Framework, Security Management, Cyber Governance, Authentications, Cryptographic Protocols, Cyber Security Strategy, Authorization (Computing), TCP/IP, ISO/IEC 27001, Network Protocols, Computer Architecture, Computer Systems, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk

      4.7
      Rating, 4.7 out of 5 stars
      ·
      101 reviews

      Beginner · Specialization · 3 - 6 Months

    • P

      Packt

      Playwright Python and Pytest for Web Automation Testing

      Skills you'll gain: Test Automation, Continuous Integration, Authentications, Software Testing, CI/CD, Test Execution Engine, Scripting, Web Development Tools, Test Case, Application Programming Interface (API), Browser Compatibility, Behavior-Driven Development, Event-Driven Programming, Test Data, Verification And Validation, Cascading Style Sheets (CSS), UI Components, Software Installation, User Interface (UI), Debugging

      4.5
      Rating, 4.5 out of 5 stars
      ·
      8 reviews

      Intermediate · Course · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Advanced System Security Topics

      Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Security Controls, Data Access, Encryption, Data Security, Mobile Security, Geographic Information Systems, Public Key Infrastructure, Network Security, Cryptography, Wireless Networks

      4.6
      Rating, 4.6 out of 5 stars
      ·
      354 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free
      Free
      I

      Infosec

      CompTIA Security+ 701

      Skills you'll gain: Cybersecurity, Cyber Attacks, Cryptography, Identity and Access Management, Data Governance, Encryption, Network Security, Application Security, Data Security, Virtualization, Computer Security, Threat Management, Security Controls, Cloud Computing, Authorization (Computing), User Accounts, Authentications, Information Technology Operations, Incident Response, Risk Management

      4.5
      Rating, 4.5 out of 5 stars
      ·
      304 reviews

      Intermediate · Course · 3 - 6 Months

    Searches related to authentications

    security and authentication
    authentication, e-commerce features & order management
    user authentication: identity-aware proxy
    authentication, authorization, and identity with vault
    firebase authentication: build secure angular apps
    identity access management (iam) and secure authentication
    ajax next level: authentication, servers, projects & more
    ajax authentication and cross-origin requests
    1…161718…37

    In summary, here are 10 of our most popular authentications courses

    • 5G Network Fundamentals: Institut Mines-Télécom
    • Securing Linux Systems: LearnQuest
    • Design and Analyze Secure Networked Systems: University of Colorado System
    • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
    • Developing Applications with Google Cloud 日本語版: Google Cloud
    • Manage Identities and Governance in Azure: Whizlabs
    • Architecting with Google Kubernetes Engine 日本語版: Google Cloud
    • Security in Google Cloud 日本語版: Google Cloud
    • Cyber Security – Technology and Governance: Royal Holloway, University of London
    • Playwright Python and Pytest for Web Automation Testing: Packt

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok