Cybersecurity and Secure Software Design
About this Course
Introduction of basic principles and applications of cybersecurity. Topics include symmetric and asymmetric encryption and decryption algorithms, hashing techniques, digital certificates, digital signatures, message authentication codes, authentication, malware, and security of systems such as networks, operating systems, software, and databases. Upon successfully completing this course, the student should be able to: describe symmetric and asymmetric cryptographic algorithms, demonstrate security application development skills, compare key distribution algorithms, compare authentication techniques, explain transport layer security, and demonstrate proficiency in the security of systems and applications such as email, networking, database, and operating systems.Created by: Ball State University

Related Online Courses
As data becomes the modern currency, so the ability to quickly and accurately analyse data has become of paramount importance. Therefore, data analytics and visualization are two of the most sought... more
This course covers Network Function Virtualization from the perspective of a systems engineer. It first discusses the proliferation of middleboxes in enterprise networks and the necessity of... more
In this course, you will understand the influence of the angle of attack and speed on the lift. Then we will focus on hazards and limitations, like stall, spiral dive, or flutter. You will... more
Kidney transplantation is a major advance of modern medicine which provides high-quality of life for patients with end-stage renal disease. What used to be an experimental, risky, and very limited... more
AWS: Databases Course is the fourth course of Exam Prep DVA-C02: AWS Certified Developer Associate Specialization. This course assists learners in learning the core concepts of NoSQL, contrasting... more