Applied Cryptography, PKI, & Cloud Security
This course covers advanced cryptographic protocols, public key infrastructure, and cloud and virtualization security, three interconnected areas that define how modern IT environments protect data and identity. Covering approximately 4.5 hours of expert instruction, learners develop the skills to implement applied cryptography, manage PKI infrastructure, and secure cloud workloads and virtual environments.
Learners benefit by understanding TLS, IPSec, and key management solutions, how to configure and validate digital certificates, how to apply the shared responsibility model, and how to secure IaaS, PaaS, and SaaS environments and hypervisor infrastructure. Online labs reinforce certificate management and cloud security configuration tasks. By the end of this course, learners will be able to implement advanced cryptographic solutions, manage a PKI environment, and apply security controls to cloud and virtual infrastructures.
Watch on Coursera ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
More on: Security Basics
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
How to Map Out Your Digital Footprint Before Attackers Do in 2026
Medium · Cybersecurity
The Most Dangerous Kind of Information
Medium · Cybersecurity
Hardware End-of-Support-Life (EOSL) — The EOL Risk Nobody Tracks
Dev.to · endoflife-ai
Hidden Compliance Risks from Unsupported Software — What Auditors Find First
Dev.to · endoflife-ai
🎓
Tutor Explanation
DeepCamp AI