Cryptography

Sort options

Cybersecurity for Data Science (Coursera)

This course aims to help anyone interested in data science understand the cybersecurity risks and the tools/techniques that can be used to mitigate those risks. We will cover the distinctions between confidentiality, integrity, and availability, introduce learners to relevant cybersecurity tools and techniques including cryptographic tools, software resources, [...]
0
No votes yet

Intel® Network Academy - Network Transformation 102 (Coursera)

Welcome to the Intel® Network Academy – a comprehensive training program on network transformation. In this program, we will be covering the topic areas of software defined infrastructure (SDI) network functions virtualization (NFV), software-defined networking (SDN) and beyond. Network Transformation 102 covers topics such as VNF Operations & [...]
0
No votes yet

Cloud Security Basics (Coursera)

This course introduces you to cybersecurity for the cloud. We'll learn and apply classic security techniques to today’s cloud security problems. We start with a deceptively simple and secure web service and address the problems arising as we improve it. We’ll analyze recent cloud security vulnerabilities using standard, systematic [...]
0
No votes yet

How Entrepreneurs in Emerging Markets can master the Blockchain Technology (Coursera)

In this course, you will gain a thorough understanding of the blockchain and distributed ledger technologies, including an introduction to the necessary foundations in cryptography. The course will discuss blockchain as a distributed ledger and introduce distributed consensus as a mechanism to maintain the integrity of the blockchain. The [...]
0
No votes yet

Cryptography: Boolean functions and related problems (Coursera)

The course invites you to learn more about cryptography; you'll learn some important math which stands behind the ciphers, and defines how resistant the particular cipher will be to different types of attacks.
0
No votes yet

Cybersecurity Compliance Framework & System Administration (Coursera)

This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization. You will learn the basic commands for user [...]
10
Average: 10 ( 4 votes )

Cyber Attack Countermeasures (Coursera)

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID [...]
4
Average: 4 ( 3 votes )

Cryptography and Information Theory (Coursera)

This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff's Principle. It also [...]
9
Average: 9 ( 3 votes )

Cryptographic Hash and Integrity Protection (Coursera)

This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric [...]
6
Average: 6 ( 3 votes )

Asymmetric Cryptography and Key Management (Coursera)

In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair [...]
0
No votes yet