Applied Cryptography
About this Specialization
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.Created by: University of Colorado System
Related Online Courses
The objective of this course is to provide an overview of the culture of ancient Rome beginning about 1000 BCE and ending with the so-called \"Fall of Rome\". We will look at some of the key people... more
In Software Requirements Elicitation for Secure Software Development, we\'re going to discuss the overall software requirements process as it applies in waterfall, spiral, and agile models. You\'ll... more
Develop the proficiency required to design and develop comprehensive, scalable, and high-performing applications with the .NET framework via this in-depth specialization. The curriculum is... more
This specialization is intended for researchers or research enthusiasts of all different levels to help them know what their omic data means and how to learn about it! With an overhwelming... more
Immerse yourself in the dynamic realm of e-commerce supply chains with our course, \"Supply Chain Management for E-commerce.\" Designed for emerging entrepreneurs, small business owners, and career... more