Applied Cryptography Specialization

Description

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.

Learners will build the logic and the pseudo-code for the widely used cryptographic primitives and algorithms (as opposed to merely knowing how to use them as black boxes), which will enable them to implement the cryptographic primitives in any platforms/language they choose.

What’s included