Cybersecurity and Secure Software Design
About this Course
Introduction of basic principles and applications of cybersecurity. Topics include symmetric and asymmetric encryption and decryption algorithms, hashing techniques, digital certificates, digital signatures, message authentication codes, authentication, malware, and security of systems such as networks, operating systems, software, and databases. Upon successfully completing this course, the student should be able to: describe symmetric and asymmetric cryptographic algorithms, demonstrate security application development skills, compare key distribution algorithms, compare authentication techniques, explain transport layer security, and demonstrate proficiency in the security of systems and applications such as email, networking, database, and operating systems.Created by: Ball State University

Related Online Courses
This specialization extends upon the initial introduction specialization, and like the other specialization, it introduces a limited number of new materials science and engineering concepts.... more
The Highway Planning, Pavement Design, and Construction specialization by L&T EduTech provides a comprehensive learning experience in highway engineering, aligned with Indian standards. It covers... more
Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same... more
This Specialization is intended for professionals who seek to improve their management competencies and skills. Through five courses, you will cover Delphi Method, Scenario Planning, Models and... more
This course is the second course in the specialization about learning how to develop video games using GameMaker on Windows or Mac. Why use GameMaker instead of using C# and Unity or C++ and... more