AES

Sort options

Symmetric Cryptography (Coursera)

Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. [...]
5
Average: 5 ( 3 votes )

Information Security - Authentication and Access Control (edX)

Learn more fundamentals of information security, including Introduction to Cryptography, Authentication, Access Control and Containerization. This is the 2nd course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program.
0
No votes yet