SUNYIT Classifieds>SUNYIT Online Courses>Introduction to Applied Cryptography

Introduction to Applied Cryptography

About this Course

This course is a non-mathematical introduction to the role that cryptography plays in providing digital security for everyday applications such as the internet, mobile phones, wireless networks and cryptocurrency. In this introductory course you will develop an understanding of the functionality and purpose of the main cryptographic tools we use today. You will learn how to make decisions about which cryptographic tools are most appropriate to deploy in specific settings. You will also explore the wider infrastructure surrounding cryptography and how this impacts the overall security of systems deploying cryptography. Cryptography provides the core toolkit that underpins most digital security technologies. An understanding of what cryptography does, and its limitations, is critical to developing a wider appreciation of the security of everyday digital applications. Since cryptography provides tools for atomic security services such as confidentiality and data integrity, an appreciation of cryptography will also equips you with a fundamental understanding of what security means in cyberspace. Learning outcomes for the module. By the end of this module learners will be able to: 1. Explain the precise role that cryptography plays in the security of any digital system. 2. Appreciate the breadth of use of cryptography to support security of digital systems. 3. Identify core concepts and terminology concerning use of cryptography 4. Assess the points of vulnerability relating to cryptography in any digital system deploying it.

Created by: University of London


Related Online Courses

This course will be covering hot topics in the Esports industry. With Esports exploding in popularity over the last ten years, there are a lot of issues to discuss. We will also be talking about... more
Supply Chains are made up of a network of companies from the initial raw materials to the ultimate consumer of the finished product. Within this network of companies, there are three ongoing flows:... more
This course aims at introducing the fundamental concepts of Reinforcement Learning (RL), and develop use cases for applications of RL for option valuation, trading, and asset management. By the end... more
In this course, you will learn how to diagnose and troubleshoot the most common networking and security problems in a FortiGate network security solution.Created by: Fortinet, Inc. more
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you learn the fundamentals of configuring vector search in Cloud SQL for PostgreSQL.Created by: Google Cloud more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL