web analytics

Applied Cryptography Specialization

Improve Your Career in Computer Security. Master the cryptographic tools and their design principles to apply them for computer security
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.

Applied Learning Project
Learners will build the logic and the pseudo-code for the widely used cryptographic primitives and algorithms (as opposed to merely knowing how to use them as black boxes), which will enable them to implement the cryptographic primitives in any platforms/language they choose.

Course Information

Estimated Time: Approximately 5 months to complete Suggested pace of 2 hours/week

Difficulty: Intermediate

Free

Enroll

Course Information

Estimated Time: Approximately 5 months to complete Suggested pace of 2 hours/week

Difficulty: Intermediate