關於此 專項課程

Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience.

立即開始，按照自己的計劃學習。

設置並保持靈活的截止日期。

建議 8 小時/週

字幕：英語（English）...

CryptosystemCryptographic Hash Function (CRHF)Modular Exponentiation

立即開始，按照自己的計劃學習。

設置並保持靈活的截止日期。

建議 8 小時/週

字幕：英語（English）...

Coursera 專項課程是幫助您掌握一門技能的一系列課程。若要開始學習，請直接註冊專項課程，或預覽專項課程並選擇您要首先開始學習的課程。當您訂閱專項課程的部分課程時，您將自動訂閱整個專項課程。您可以只完成一門課程，您可以隨時暫停學習或結束訂閱。訪問您的學生面板，跟踪您的課程註冊情況和進度。

每個專項課程都包括實踐項目。您需要成功完成這個（些）項目才能完成專項課程並獲得證書。如果專項課程中包括單獨的實踐項目課程，則需要在開始之前完成其他所有課程。

在結束每門課程並完成實踐項目之後，您會獲得一個證書，您可以向您的潛在雇主展示該證書並在您的職業社交網絡中分享。

4.6

68 個評分

•

17 個審閱

Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove especially useful to you if you are new to cybersecurity Course 1, Classical Cryptosystems, introduces you to basic concepts and terminology related to cryptography and cryptanalysis. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability....

4.6

50 個評分

•

7 個審閱

Welcome to Course 2 of Introduction to Applied Cryptography. In this course, you will be introduced to basic mathematical principles and functions that form the foundation for cryptographic and cryptanalysis methods. These principles and functions will be helpful in understanding symmetric and asymmetric cryptographic methods examined in Course 3 and Course 4. These topics should prove especially useful to you if you are new to cybersecurity. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability....

4.4

38 個評分

•

3 個審閱

Welcome to Symmetric Cryptography!
Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Then, we build on product ciphers (using both substitution and transposition/permutation) to describe modern block ciphers and review the widely used cipher algorithms in DES, 3-DES, and AES. Lastly, we enable the use of block ciphers to support variable data length by introducing different modes of block cipher operations in ECB, CBC, CFB, OFB, and CTR modes.
This course is cross-listed and is a part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization....

4.6

42 個評分

•

3 個審閱

Welcome to Asymmetric Cryptography and Key Management!
In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair of keys can provide different security properties. Then, we will study the popular asymmetric schemes in the RSA cipher algorithm and the Diffie-Hellman Key Exchange protocol and learn how and why they work to secure communications/access. Lastly, we will discuss the key distribution and management for both symmetric keys and public keys and describe the important concepts in public-key distribution such as public-key authority, digital certificate, and public-key infrastructure. This course also describes some mathematical concepts, e.g., prime factorization and discrete logarithm, which become the bases for the security of asymmetric primitives, and working knowledge of discrete mathematics will be helpful for taking this course; the Symmetric Cryptography course (recommended to be taken before this course) also discusses modulo arithmetic.
This course is cross-listed and is a part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization....

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

退款政策是如何规定的？

我可以只注册一门课程吗？

可以！点击您感兴趣的课程卡开始注册即可。注册并完成课程后，您可以获得可共享的证书，或者您也可以旁听该课程免费查看课程资料。如果您订阅的课程是某专项课程的一部分，系统会自动为您订阅完整的专项课程。访问您的学生面板，跟踪您的进度。

有助学金吗？

我可以免费学习课程吗？

此课程是 100% 在线学习吗？是否需要现场参加课程？

此课程完全在线学习，无需到教室现场上课。您可以通过网络或移动设备随时随地访问课程视频、阅读材料和作业。

完成专项课程需要多长时间？

This specialization includes approximately 90 hours of course material, of which about 20 hours is related to project work.

What background knowledge is necessary?

While there are no specific prerequisites for this specialization, it does assume some proficiency in logic and mathematics. Similarly, while this is mostly a non-technical course, it does require analytical and problem-solving skills on the part of the learner.

Do I need to take the courses in a specific order?

Learners are not required to take courses in any particular order, though we recommend the learner complete the courses in ascending numerical sequence.

完成专项课程后我会获得大学学分吗？

Provided the learner meets minimum satisfactory grade requirements (i.e., 70% on course work & 100% on project work), they may apply for course credit through the University of Colorado at Colorado Springs. Additional costs and requirements may be entailed.

What will I be able to do upon completing the Specialization?

This course will provide insight and direction on developing and implementing a coherent cybersecurity program within an organization. The primary benefit of such a program is that will accommodate strategic planning, giving an organization a sense of where it is, where it's going, and how it can get there. It offers a means of managing your destiny.

還有其他問題嗎？請訪問 學生幫助中心。