Applied Cryptography
About this Specialization
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.Created by: University of Colorado System
Related Online Courses
In this comprehensive course, aspiring front-end developers will discover the transformative capabilities of Firebase. By leveraging Firebase\'s cloud architecture, you can seamlessly incorporate a... more
This is a one-hour course for nontechnical audiences so they can understand how GenAI models are trained with the basics of the data science process through a simple interactive demo where they... more
In this course, you will learn the science behind how digital images and video are made, altered, stored, and used. We will look at the vast world of digital imaging, from how computers and digital... more
Are you ready to excel as a remote leader? Enhance your leadership skills with the Remote Leadership for Managers specialization, designed to equip you with the tools to lead a successful,... more
Do you dream of being a CMIO or a Senior Director of Clinical Informatics? If you are aiming to rise up in the ranks in your health system or looking to pivot your career in the direction of big... more