Applied Cryptography

بواسطة: Coursera

Overview

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.

Syllabus

Course 1: Cryptography and Information Theory
- Offered by University of Colorado System. Welcome to Cryptography and Information Theory! This course combines cryptography (the ... Enroll for free.

Course 2: Symmetric Cryptography
- Offered by University of Colorado System. Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure ... Enroll for free.

Course 3: Asymmetric Cryptography and Key Management
- Offered by University of Colorado System. Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key ... Enroll for free.

Course 4: Cryptographic Hash and Integrity Protection
- Offered by University of Colorado System. Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash ... Enroll for free.

Courses

Taught by

Sang-Yoon Chang

Applied Cryptography
الذهاب الي الدورة

Applied Cryptography

بواسطة: Coursera

  • Coursera
  • مدفوعة
  • الإنجليزية
  • متاح شهادة
  • متاح في أي وقت
  • intermediate
  • N/A