Applied Cryptography

About this Specialization

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.

Created by: University of Colorado System


Related Online Courses

This specialization covers the fundamentals of surveys as used in market research, evaluation research, social science and political research, official government statistics, and many other topic... more
This course gives you a complete insight into the modern design of digital systems fundamentals from an eminently practical point of view. Unlike other more \"classic\" digital circuits courses,... more
This ITIL V4 Specialization provides an in-depth understanding of IT Service Management best practices, aligning IT services with business needs. Through a series of expertly designed courses, you... more
Learn to use tools from the Bioconductor project to perform analysis of genomic data. This is the fifth course in the Genomic Big Data Specialization from Johns Hopkins University.Created by: Johns... more
This comprehensive course unravels the potential of generative AI in data analytics. The course will provide an in-depth knowledge of the fundamental concepts, models, tools, and generative AI... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL