Acerca de este Curso
6,786 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 12 horas para completar

Sugerido: 4 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 12 horas para completar

Sugerido: 4 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
4 horas para completar

Understand and Apply Fundamental Concepts of Cryptography

16 videos (Total 90 minutos), 15 lecturas, 1 cuestionario
16 videos
Fundamental Concepts of Cryptography: Key Concepts and Definitions6m
Fundamental Concepts of Cryptography: Key Concepts and Definitions6m
Fundamental Concepts of Cryptography: Key Concepts and Definitions3m
Fundamental Concepts of Cryptography: Key Concepts and Definitions5m
Fundamental Concepts of Cryptography: Key Concepts and Definitions3m
Fundamental Concepts of Cryptography: Key Concepts and Definitions6m
Fundamental Concepts of Cryptography: Key Concepts and Definitions4m
Fundamental Concepts of Cryptography: Key Concepts and Definitions8m
Fundamental Concepts of Cryptography: High Work Factor5m
Fundamental Concepts of Cryptography: Block Ciphers4m
Fundamental Concepts of Cryptography: Basic Block Cipher Modes5m
Fundamental Concepts of Cryptography: Evaluation of Algorithms7m
Fundamental Concepts of Cryptography: Algorithm Characteristics6m
Fundamental Concepts of Cryptography: Attacks7m
Fundamental Concepts of Cryptography: The Birthday Paradox4m
15 lecturas
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: High Work Factor10m
Fundamental Concepts of Cryptography: Block Ciphers10m
Fundamental Concepts of Cryptography: Basic Block Cipher Modes10m
Fundamental Concepts of Cryptography: Evaluation of Algorithms10m
Fundamental Concepts of Cryptography: Algorithm Characteristics10m
Fundamental Concepts of Cryptography: Attacks10m
Fundamental Concepts of Cryptography: The Birthday Paradox10m
1 ejercicio de práctica
Quiz 120m
Semana
2
4 horas para completar

Understand Requirements for Cryptography

14 videos (Total 87 minutos), 14 lecturas, 1 cuestionario
14 videos
Fundamental Concepts of Cryptography: Symmetric Cryptography5m
Fundamental Concepts of Cryptography: Key Distribution6m
Fundamental Concepts of Cryptography: Additional Algorithms5m
Fundamental Concepts of Cryptography: Asymmetric Cryptography7m
Fundamental Concepts of Cryptography: Using Public Key Cryptography7m
Fundamental Concepts of Cryptography: Attacking RSA7m
Fundamental Concepts of Cryptography: Message Digests5m
Fundamental Concepts of Cryptography: Chosen Plain-Text7m
Fundamental Concepts of Cryptography: Known Plaintext6m
Fundamental Concepts of Cryptography: Dictionary Attack4m
Fundamental Concepts of Cryptography: Factoring Attack5m
Understand Requirements For Cryptography: Data Sensitivity2m
Understand Requirements For Cryptography: Data Protection Directive7m
14 lecturas
Fundamental Concepts of Cryptography: Salting10m
Fundamental Concepts of Cryptography: Symmetric Cryptography10m
Fundamental Concepts of Cryptography: Key Distribution10m
Fundamental Concepts of Cryptography: Additional Algorithms10m
Fundamental Concepts of Cryptography: Asymmetric Cryptography10m
Fundamental Concepts of Cryptography: Using Public Key Cryptography10m
Fundamental Concepts of Cryptography: Attacking RSA10m
Fundamental Concepts of Cryptography: Message Digests10m
Fundamental Concepts of Cryptography: Chosen Plain-Text10m
Fundamental Concepts of Cryptography: Known Plaintext10m
Fundamental Concepts of Cryptography: Dictionary Attack10m
Fundamental Concepts of Cryptography: Factoring Attack10m
Understand Requirements For Cryptography: Data Sensitivity10m
Understand Requirements For Cryptography: Data Protection Directive10m
1 ejercicio de práctica
Quiz 214m
Semana
3
3 horas para completar

Operate and Implement Cryptographic System

9 videos (Total 55 minutos), 9 lecturas, 1 cuestionario
9 videos
Operate and Implement Cryptographic System: X.509 Certification8m
Operate and Implement Cryptographic System: PKI Activity4m
Operate and Implement Cryptographic System: Standards5m
Operate and Implement Cryptographic System: Truly Random7m
Operate and Implement Cryptographic System: Key Storage and Destruction3m
Operate and Implement Cryptographic System: Factors Affecting Risk6m
Operate and Implement Cryptographic System: Secure Protocols7m
Operate and Implement Cryptographic System: Digital Signatures7m
9 lecturas
Operate and Implement Cryptographic System: PKI10m
Operate and Implement Cryptographic System: X.509 Certification10m
Operate and Implement Cryptographic System: PKI Activity10m
Operate and Implement Cryptographic System: Standards10m
Operate and Implement Cryptographic System: Truly Random10m
Operate and Implement Cryptographic System: Key Storage and Destruction10m
Operate and Implement Cryptographic System: Factors Affecting Risk10m
Operate and Implement Cryptographic System: Secure Protocols10m
Operate and Implement Cryptographic System: Digital Signatures10m
1 ejercicio de práctica
Quiz 316m
Semana
4
2 horas para completar

Cryptography Case Study

1 cuestionario
4.6
9 revisionesChevron Right

Principales revisiones sobre Criptografía

por MKNov 6th 2019

One of the most important security topics for CIA, Authentication & Non-repudiation. Absolutely must have knowledge as a security stakeholder. Practical skills throughout the course. Thanks.

por AJan 16th 2019

interns of telecommunication this is the best very nice one out

Instructor

Avatar

(ISC)² Education & Training

Education & Training

Acerca de (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

Acerca de (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Preguntas Frecuentes

  • Sí, puedes acceder a una vista preliminar del primer video y ver el programa antes de inscribirte. Debes comprar el curso para acceder a contenido que no está incluido en la vista preliminar

  • Si decides inscribirte en el curso antes de la fecha de inicio de la sesión, tendrás acceso a todos los videos y las lecturas de la lección para el curso. Podrás enviar tareas en cuanto comience la sesión.

  • Una vez que te inscribes y comienza la sesión, tendrás acceso a todos los videos y otros recursos, incluidos artículos de lectura y el foro de debate del curso. Podrás ver y enviar tareas de práctica y completar tareas con calificación obligatorias para obtener un título y un Certificado de curso

  • Si completas el curso de manera correcta, tu Certificado de curso electrónico se agregará a la página Logros. Desde allí, puedes imprimir tu Certificado de curso o agregarlo a tu perfil de LinkedIn

  • Este curso es uno de los pocos que se ofrecen en Coursera que está actualmente disponible solo para estudiantes que pagaron o que recibieron ayuda económica, si está disponible.

  • The course schedule contains approximately 14 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 6 weeks.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.