-
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.
-
Course 1: Cryptography and Information Theory
- Offered by University of Colorado System. Welcome to Cryptography and Information Theory! This course combines cryptography (the ... Enroll for free.
Course 2: Symmetric Cryptography
- Offered by University of Colorado System. Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure ... Enroll for free.
Course 3: Asymmetric Cryptography and Key Management
- Offered by University of Colorado System. Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key ... Enroll for free.
Course 4: Cryptographic Hash and Integrity Protection
- Offered by University of Colorado System. Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash ... Enroll for free.