The importance of protecting information and data makes it into headlines every day. Cryptography is the practice of techniques used to protect the secure transmission of information. This course is an excellent starting point to understand what cryptography is, learn how cryptography used, and understand hash, symmetric, and asymmetric cryptographic algorithms.
This course not only covers the fundamentals of cryptography, but also provides a hands-on experience through the use of live virtual machine labs, lab simulations, and case projects. Hands-on projects will have you use stenography to send a hidden message, use a has generator, and even have you use Microsoft's Encrypting File System.
A basic knowledge of cryptography is needed for many careers such as cyber security, software development, computer networks, and database administration.
Don't just learn about cryptography, roll your sleeves up, and get to actually so cryptography with the labs, simulations, and projects in this course.
Instructor(s):
- Internet access
- Email
- One of the following browsers:
- Mozilla Firefox
- Microsoft Internet Explorer (9.0 or above)
- Google Chrome
- Safari
- Adobe PDF plugin
Hide Syllabus
A new section of each course starts monthly. If enrolling in a series of two or more courses, please be sure to space the start date for each course at least two months apart. All courses run for six weeks, with a two-week grace period at the end. Two lessons are released each week for the six-week duration of the course. You do not have to be present when lessons are released. You will have access to all lessons until the course ends. However, the interactive discussion area that accompanies each lesson will automatically close two weeks after the lesson is released. As such, we strongly recommend that you complete each lesson within two weeks of its release. The final exam will be released on the same day as the last lesson. Once the final exam has been released, you will have two weeks to complete all of your course work, including the final exam. Lesson 1
- Defining Cryptography
- What is Cryptography
- Cryptography and Security
- Cryptographic Algorithms
- Hash Algorithms
- Symmetric Cryptographic Algorithms
- Asymmetric Cryptographic Algorithms
- Using Cryptography
- Encryption through Software
- Hardware Encryption
- Summary
- Hands-On Projects
- Case Projects
- Lab Simulations
- Live Virtual Machine Lab
- Review
- Final Exam
Hide Syllabus
|