Macquarie University
Cyber Security: Data & Identity Security Specialization
Macquarie University

Cyber Security: Data & Identity Security Specialization

Data and Identity Protection Mastery. Learn to secure information, control digital access, and apply cryptography in real-world systems

Matt Bushby

Instructor: Matt Bushby

Included with Coursera Plus

Get in-depth knowledge of a subject
Intermediate level
Some related experience required
4 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject
Intermediate level
Some related experience required
4 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Secure sensitive data with advanced privacy and protection techniques.

  • Design and manage robust identity and access management systems.

  • Apply cryptographic tools to protect data at rest, in transit, and in use.

  • Ensure compliance with global regulations while preserving digital trust.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

September 2025

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Macquarie University

Specialization - 3 course series

What you'll learn

  • Understand key risks to data security and privacy in digital environments.

  • Apply de-identification and anonymisation methods to protect sensitive data.

  • Navigate global privacy frameworks like GDPR and local legal obligations.

  • Implement controls to secure data across storage, access, and sharing systems.

Skills you'll gain

Category: Information Privacy
Category: Data Security
Category: Cybersecurity
Category: Cyber Risk
Category: Security Strategy
Category: Data Governance
Category: Security Software
Category: Compliance Management
Category: Data Encryption Standard
Category: Risk Management
Category: Threat Detection
Category: Security Management
Category: Data Ethics
Category: Threat Modeling
Category: Data Access
Category: Vulnerability
Category: NIST 800-53
Category: General Data Protection Regulation (GDPR)
Category: Vulnerability Assessments
Category: Personally Identifiable Information

What you'll learn

  • Design and manage secure authentication systems.

  • Implement SSO, MFA, and passwordless authentication.

  • Control user access with modern IAM frameworks.

  • Detect and respond to identity-based cyber threats.

Skills you'll gain

Category: Identity and Access Management
Category: Authentications
Category: Multi-Factor Authentication
Category: Single Sign-On (SSO)
Category: User Provisioning
Category: Cyber Security Assessment
Category: Role-Based Access Control (RBAC)
Category: Security Assertion Markup Language (SAML)
Category: Threat Management
Category: User Accounts
Category: Risk Management
Category: AWS Identity and Access Management (IAM)
Category: Cybersecurity
Category: Remote Access Systems
Category: Threat Detection
Category: Key Management
Category: OAuth
Category: Threat Modeling
Category: Azure Active Directory
Category: Cryptography

What you'll learn

  • Understand core cryptographic principles, algorithms, and encryption methods.

  • Apply symmetric and asymmetric encryption to secure data and communications.

  • Explore cryptography in real-world systems like blockchain and VPNs.

  • Evaluate cryptographic risks and implement secure key management practices.

Skills you'll gain

Category: Encryption
Category: Cryptography
Category: Blockchain
Category: Virtual Private Networks (VPN)
Category: Data Security
Category: Key Management
Category: Network Security
Category: Wireless Networks
Category: Data Encryption Standard
Category: Security Engineering
Category: Intellectual Property
Category: Data Integrity
Category: Authentications
Category: Public Key Infrastructure
Category: Cybersecurity
Category: Security Management
Category: Application Security
Category: Hardware Architecture
Category: Emerging Technologies

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
15 Courses6,603 learners

Offered by

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions