Applied Cryptography
About this Specialization
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.Created by: University of Colorado System

Related Online Courses
This is a self-paced lab that takes place in the Google Cloud console. In this lab you will explore the benefits of different Google Kubernetes Engine autoscaling strategies, like Horizontal Pod... more
Our \"Programming with Generative AI\" course takes you on a practical journey, exploring how generative AI tools can transform your coding workflow. Whether you\'re a software developer, tech... more
This course provides the fundamental knowledge necessary for program managers and implementors in a hypertension control program, especially in resource-limited settings. The course is interactive... more
After completing this course, learners will have an understanding of a variety of black-box and white-box testing techniques. The learner will have put this understanding into practice, creating... more
The \"AJAX for Web Developers\" course explores how modern websites update parts of a web page without the need to reload the entire page, providing a fluid and fast user experience. This course... more