課程信息
4.5
2 個評分
專項課程
100% online

100% online

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
初級

初級

完成時間(小時)

完成時間大約為13 小時

建議:5 hours/week...
可選語言

英語(English)

字幕:英語(English)...
專項課程
100% online

100% online

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
初級

初級

完成時間(小時)

完成時間大約為13 小時

建議:5 hours/week...
可選語言

英語(English)

字幕:英語(English)...

教學大綱 - 您將從這門課程中學到什麼

1
完成時間(小時)
完成時間為 4 小時

Understand and Apply Fundamental Concepts of Cryptography

Module Topics: Encryption Concepts, Methods of Cryptography, Specific Hashing, In Encryption Concepts you will learn about key concepts and definitions and high work factor. In Methods of Cryptography you will learn about stream-based ciphers, stream-based cipher rules, block ciphers, Initialization Vectors (IV) – Why are they needed? basic block cipher modes, evaluation of algorithms, common encryption techniques, encryption algorithm characteristics, and hashing. In Specific Hashing you will learn about message digest (MD) 2, 4, and 5, secure hash algorithm (SHA) 0, 1, and 2, hAVAL, RIPEMD-160, attacks on hashing algorithms and message authentication codes, and the birthday paradox....
Reading
16 個視頻(共 90 分鐘), 15 個閱讀材料, 1 個測驗
Video16 個視頻
Fundamental Concepts of Cryptography: Key Concepts and Definitions6分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions6分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions3分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions5分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions3分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions6分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions4分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions8分鐘
Fundamental Concepts of Cryptography: High Work Factor5分鐘
Fundamental Concepts of Cryptography: Block Ciphers4分鐘
Fundamental Concepts of Cryptography: Basic Block Cipher Modes5分鐘
Fundamental Concepts of Cryptography: Evaluation of Algorithms7分鐘
Fundamental Concepts of Cryptography: Algorithm Characteristics6分鐘
Fundamental Concepts of Cryptography: Attacks7分鐘
Fundamental Concepts of Cryptography: The Birthday Paradox4分鐘
Reading15 個閱讀材料
Fundamental Concepts of Cryptography: Key Concepts and Definitions10分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions10分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions10分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions10分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions10分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions10分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions10分鐘
Fundamental Concepts of Cryptography: Key Concepts and Definitions10分鐘
Fundamental Concepts of Cryptography: High Work Factor10分鐘
Fundamental Concepts of Cryptography: Block Ciphers10分鐘
Fundamental Concepts of Cryptography: Basic Block Cipher Modes10分鐘
Fundamental Concepts of Cryptography: Evaluation of Algorithms10分鐘
Fundamental Concepts of Cryptography: Algorithm Characteristics10分鐘
Fundamental Concepts of Cryptography: Attacks10分鐘
Fundamental Concepts of Cryptography: The Birthday Paradox10分鐘
Quiz1 個練習
Quiz 120分鐘
2
完成時間(小時)
完成時間為 4 小時

Understand Requirements for Cryptography

Module Topics: Salting, Symmetric/Asymmetric Cryptography, Non-Repudiation, Methods of Cryptanalytic Attack, Data Sensitivity and Regulatory Requirements, End-User Training. In data Sensitivity and Regulatory Requirements. In Symmetric/Asymmetric Cryptography you will learn about encryption and decryption, symmetric cryptography, out-of-band key distribution, advantages and disadvantages of DES, double DES, meet-in-the-middle, triple DES (3DES), advanced encryption standard (AES), Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), and how CCMP works, Rijndael. In Additional algorithms you will learn about International Data Encryption Algorithm (IDEA), CAST, Secure and Fast Encryption Routine (SAFER), Blowfish, Twofish, RC5, RC4, advantages and disadvantages of symmetric algorithms, asymmetric cryptography, asymmetric algorithms, confidential messages, open message, confidential messages with proof of origin, RSA, attacking RSA, Diffie–Hellmann Algorithm, El Gamal, Elliptic Curve Cryptography (ECC), advantages and disadvantages of asymmetric key algorithms, hybrid cryptography, message digests, message authentication code (MAC), HMAC, digital signatures, and Non-Repudiation. In methods of Cryptanalytic Attack you will learn about chosen plain-text, Social engineering for key discovery, brute force, differential cryptanalysis, linear cryptanalysis, Algebraic, rainbow table, ciphertext-only attack, known plaintext, frequency analysis, chosen cipher-text, birthday attack, dictionary attack, replay attack, reverse engineering, and temporary files. In Data Sensitivity and Regulatory Requirements you will learn about data classification examples, protected data examples, non-sensitive data examples, legislative and regulatory compliance, United States example, privacy requirements compliance, and European Data Protection Directive. In End-User Training you will learn about security awareness training topics....
Reading
14 個視頻(共 87 分鐘), 14 個閱讀材料, 1 個測驗
Video14 個視頻
Fundamental Concepts of Cryptography: Symmetric Cryptography5分鐘
Fundamental Concepts of Cryptography: Key Distribution6分鐘
Fundamental Concepts of Cryptography: Additional Algorithms5分鐘
Fundamental Concepts of Cryptography: Asymmetric Cryptography7分鐘
Fundamental Concepts of Cryptography: Using Public Key Cryptography7分鐘
Fundamental Concepts of Cryptography: Attacking RSA7分鐘
Fundamental Concepts of Cryptography: Message Digests5分鐘
Fundamental Concepts of Cryptography: Chosen Plain-Text7分鐘
Fundamental Concepts of Cryptography: Known Plaintext6分鐘
Fundamental Concepts of Cryptography: Dictionary Attack4分鐘
Fundamental Concepts of Cryptography: Factoring Attack5分鐘
Understand Requirements For Cryptography: Data Sensitivity2分鐘
Understand Requirements For Cryptography: Data Protection Directive7分鐘
Reading14 個閱讀材料
Fundamental Concepts of Cryptography: Salting10分鐘
Fundamental Concepts of Cryptography: Symmetric Cryptography10分鐘
Fundamental Concepts of Cryptography: Key Distribution10分鐘
Fundamental Concepts of Cryptography: Additional Algorithms10分鐘
Fundamental Concepts of Cryptography: Asymmetric Cryptography10分鐘
Fundamental Concepts of Cryptography: Using Public Key Cryptography10分鐘
Fundamental Concepts of Cryptography: Attacking RSA10分鐘
Fundamental Concepts of Cryptography: Message Digests10分鐘
Fundamental Concepts of Cryptography: Chosen Plain-Text10分鐘
Fundamental Concepts of Cryptography: Known Plaintext10分鐘
Fundamental Concepts of Cryptography: Dictionary Attack10分鐘
Fundamental Concepts of Cryptography: Factoring Attack10分鐘
Understand Requirements For Cryptography: Data Sensitivity10分鐘
Understand Requirements For Cryptography: Data Protection Directive10分鐘
Quiz1 個練習
Quiz 214分鐘
3
完成時間(小時)
完成時間為 3 小時

Operate and Implement Cryptographic System

Module Topics: Public Key Infrastructure (PKI), Fundamental Key Management concepts, Creation and Distribution of Keys, Web of Trust, Secure Protocols. In PKI you will learn about functions of CA, establishing trust, and X.509v3 certification issued by VeriSign. In Fundamental Key Management Concepts you will learn about standards for financial institutions, segregation of duties, and examples. In Creation and Distribution of Keys you will learn about truly random, random, generating a two-key encryption key set, key length, Asymmetric key length, key wrapping and key encryption keys, key distribution, key distribution centers, key storage and destruction, factors affecting risk exposure, cost of certificate replacement/revocation, key recovery, key escrow. In Secure Protocols you will learn about Authentication Header (AH), Encapsulating Security Payload (ESP), security associations, transport mode and tunnel mode, Internet Key Exchange (IKE), Secure/Multipurpose Internet Mail Extensions (S/MIME), S/MIME provides two security services, digital signatures, process for verifying a digital signature of an E-Mail message, message encryption, process for encryption of an E-Mail message, process for decrypting an E-Mail message, process of digitally signing and encrypting an E-mail message, process of decrypting an E-Mail message and verifying a digital signature, and triple-wrapped messages. ...
Reading
9 個視頻(共 55 分鐘), 9 個閱讀材料, 1 個測驗
Video9 個視頻
Operate and Implement Cryptographic System: X.509 Certification8分鐘
Operate and Implement Cryptographic System: PKI Activity4分鐘
Operate and Implement Cryptographic System: Standards5分鐘
Operate and Implement Cryptographic System: Truly Random7分鐘
Operate and Implement Cryptographic System: Key Storage and Destruction3分鐘
Operate and Implement Cryptographic System: Factors Affecting Risk6分鐘
Operate and Implement Cryptographic System: Secure Protocols7分鐘
Operate and Implement Cryptographic System: Digital Signatures7分鐘
Reading9 個閱讀材料
Operate and Implement Cryptographic System: PKI10分鐘
Operate and Implement Cryptographic System: X.509 Certification10分鐘
Operate and Implement Cryptographic System: PKI Activity10分鐘
Operate and Implement Cryptographic System: Standards10分鐘
Operate and Implement Cryptographic System: Truly Random10分鐘
Operate and Implement Cryptographic System: Key Storage and Destruction10分鐘
Operate and Implement Cryptographic System: Factors Affecting Risk10分鐘
Operate and Implement Cryptographic System: Secure Protocols10分鐘
Operate and Implement Cryptographic System: Digital Signatures10分鐘
Quiz1 個練習
Quiz 316分鐘
4
完成時間(小時)
完成時間為 2 小時

Cryptography Case Study

This assignment is based on a case study that will require the student to put into practice the knowledge they have gained through the course. It requires the basic understanding of the topics and the ability to relate those topics to the real world. The objective of review is to determine whether the student has understood the concepts and has performed the necessary analysis to ensure a complete and thorough answer....
Reading
1 個測驗

講師

Avatar

(ISC)² Education & Training

Education & Training

關於 (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

關於 (ISC)² Systems Security Certified Practitioner (SSCP) 專項課程

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

常見問題

  • 是的,您可以在注册之前预览第一个视频和查看授课大纲。您必须购买课程,才能访问预览不包括的内容。

  • 如果您决定在班次开始日期之前注册课程,那么您将可以访问课程的所有课程视频和阅读材料。班次开始之后,您便可以提交作业。

  • 在您注册且班次开课之后,您将可以访问所有视频和其他资源,包括阅读材料内容和课程论坛。您将能够查看和提交练习作业,并完成所需的评分作业以获得成绩和课程证书。

  • 如果您成功完成课程,您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。

  • 此课程是 Coursera 上提供的众多课程之一,当前只对已购买课程或已获得助学金的学生开放。如果您要学习此课程,但却承担不起课程费用,我们建议您提交助学金申请。

  • The course schedule contains approximately 14 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 6 weeks.

還有其他問題嗎?請訪問 學生幫助中心