Welcome to Course 2 of Introduction to Applied Cryptography. In this course, you will be introduced to basic mathematical principles and functions that form the foundation for cryptographic and cryptanalysis methods. These principles and functions will be helpful in understanding symmetric and asymmetric cryptographic methods examined in Course 3 and Course 4. These topics should prove especially useful to you if you are new to cybersecurity. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
- 5 stars73.33%
- 4 stars19%
- 3 stars5%
- 2 stars1.33%
- 1 star1.33%
來自MATHEMATICAL FOUNDATIONS FOR CRYPTOGRAPHY的熱門評論
Very interesant course. A very practical approach to modular arithmetics.
The course content and the assignments were quite meticulously designed and delivered efficiently.
It was an awesome course, I found the idea of cryptography deeply. After 10 years I fullfilled one of my dream.
Good course, but would like some more exercises to implement the mathematics learnt.
關於 Introduction to Applied Cryptography 專項課程
Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience.