Applied Cryptography 專項課程

於 Jul 30 開始

Applied Cryptography 專項課程

Improve Your Career in Computer Security。 Master the cryptographic tools and their design principles to apply them for computer security

本專項課程介紹

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.

製作方:

courses
4 courses

按照建議的順序或選擇您自己的順序。

projects
項目

旨在幫助您實踐和應用所學到的技能。

certificates
證書

在您的簡歷和領英中展示您的新技能。

項目概覽

課程
Intermediate Specialization.
Some related experience required.
  1. 第 1 門課程

    Cryptography and Information Theory

    計劃開課班次:Jul 30
    課程學習時間
    2-4 hours/week
    字幕
    English

    課程概述

    Welcome to Cryptography and Information Theory! This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course st
  2. 第 2 門課程

    Symmetric Cryptography

    計劃開課班次:Jul 30
    課程學習時間
    2-5 hours/week
    字幕
    English

    課程概述

    Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which
  3. 第 3 門課程

    Asymmetric Cryptography and Key Management

    計劃開課班次:Jul 30
    課程學習時間
    2-5 hours/week
    字幕
    English

    課程概述

    Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operation
  4. 第 4 門課程

    Cryptographic Hash and Integrity Protection

    計劃開課班次:Jul 30
    課程學習時間
    2-4 hours/week
    字幕
    English

    課程概述

    Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes me

製作方

  • University of Colorado System

    The UCCS College of Engineering and Applied Science (EAS) is rated a "Best Value" by US News and World Report.

    The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.

  • Sang-Yoon Chang

    Sang-Yoon Chang

    Assistant Professor

FAQs