Applied Cryptography

About this Specialization

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.

Created by: University of Colorado System


Related Online Courses

This course is designed for novice learners wanting to understand the basics of how security, orchestration, automation, and response (SOAR) are used for enterprise security. Learners will gain... more
The two key components of any data pipeline are data lakes and warehouses. This course highlights use-cases for each type of storage and dives into the available data lake and warehouse solutions... more
AngularJS for Beginners: Getting Started is for those interested in learning the basics of AngularJS. In this project-based course, you will learn how to use AngularJS in a development environment,... more
This course for practicing and aspiring data scientists and statisticians. It is the fourth of a four-course sequence introducing the fundamentals of Bayesian statistics. It builds on the course... more
Want to solve a murder mystery? What caused your computer to fail? Who can you trust in your everyday life? In this course, you will learn how to analyze and assess five common forms of inductive... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL