About the Course
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields.
Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.
Skills you will gain
- Entropy (Information Theory)
- Cryptography and Information Theory: This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer).
- Symmetric Cryptography: Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message.
- Asymmetric Cryptography and Key Management: In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric.
- Cryptographic Hash and Integrity Protection: This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree).
About the University
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
To know more and enroll for this course, click the link below
Note: NoticeBard is associated with Coursera through an affiliate programme.