Course Description
In this course, students learn to deploy cryptographic tools to secure their applications and services. Students will create secure communications in public channels using public-key cryptography. They will also explore methods of authenticating messages to ensure that they haven’t been tampered with in transit. And lastly, they will learn how to use digital signatures and zero-knowledge proofs to let others verify the messages sent through your services.
Part of These Certificates
Understanding Cryptography
Understanding Cryptoanalysis
Classical Cryptography
Password Best Practices
Obfuscating Data
Cryptographic Math and Frequency Analysis
Steam Ciphers and Block Ciphers
Use Steam Ciphers
Use Block Ciphers
Advanced Encryption Standard
Using Cryptography with Images
Image Cryptography
Images and Cryptography Libraries
Stenography
Message Integrity
Message Authentication Code
Setting up a Secure Channel
Cryptographic Applications and PKI
The Public-Key Transformation
The El-Gamal Cryptosystem
Elliptic Curve Cryptography
Learn best practices for using cryptography
Learn how to implement proven cryptographic tools, using easy-to-understand examples
Understand which cryptographic tools to use depending on the problem
Understand the pros and cons of various authentication methods
Ensure that your applications and systems are using up-to-date cryptography
Implementing digital signatures and zero-knowledge proofs
Related Courses
Earning a SLU certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
No related courses found.