Applied Cryptography
About this Specialization
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.Created by: University of Colorado System

Related Online Courses
Ini adalah materi kedua dalam program Google Project Management Certificate (Sertifikat Manajemen Proyek Google). Materi ini akan menunjukkan kepada Anda cara menyiapkan proyek agar sukses pada... more
Informatics research often requires multidisciplinary teams. This requires more flexibility to communicate with team members with distinct backgrounds. Furthermore, team members often have... more
This course is aimed at business professionals, web designers, and other interested professionals who collect, process, use, or otherwise encounter personal data subject to the European Union\'s... more
Part 2 of the Privacy Fundamentals course will cover data assessments, documentation and privacy rights. We will also explore different training methods including competency based training.Created... more
This program provides the skills you need to advance your career in cloud architecture and provides a pathway to earn the industry-recognized Google Cloud Associate Cloud Engineer certification.... more