Programa especializado: Introduction to Applied Cryptography
Introduction to Applied Cryptography. Cryptographic methods underpinning cybersecurity.
ofrecido por


Habilidades que obtendrás
Acerca de este Programa Especializado
Proyecto de aprendizaje aplicado
Each course includes a corresponding learner's project. The projects are designed to help learners objectively evaluate different cryptographic methods as they may be applied to cybersecurity. The project assignments are graded assessments. Learners must earn 100% on the projects to successfully complete this specialization.
No se requiere experiencia previa.
No se requiere experiencia previa.
Hay 4 cursos en este Programa Especializado
Classical Cryptosystems and Core Concepts
Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove especially useful to you if you are new to cybersecurity Course 1, Classical Cryptosystems, introduces you to basic concepts and terminology related to cryptography and cryptanalysis. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.
Mathematical Foundations for Cryptography
Welcome to Course 2 of Introduction to Applied Cryptography. In this course, you will be introduced to basic mathematical principles and functions that form the foundation for cryptographic and cryptanalysis methods. These principles and functions will be helpful in understanding symmetric and asymmetric cryptographic methods examined in Course 3 and Course 4. These topics should prove especially useful to you if you are new to cybersecurity. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.
Asymmetric Cryptography and Key Management
Welcome to Asymmetric Cryptography and Key Management!
ofrecido por

Sistema Universitario de Colorado
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Preguntas Frecuentes
¿Recibiré crédito universitario por completar el programa especializado?
Can I just enroll in a single course?
¿Puedo inscribirme en un solo curso?
Can I take the course for free?
¿Puedo tomar este curso de manera gratuita?
¿Este curso es 100 % en línea? ¿Necesito asistir a alguna clase en persona?
¿Cuánto tiempo se necesita para completar un programa especializado?
Do I need to take the courses in a specific order?
Will I earn university credit for completing the Specialization?
¿Recibiré crédito universitario por completar el programa especializado?
¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.