In this course you will learn how cryptography is the cornerstone of security technologies, and how through its use of different encryption methods you can protect private or sensitive information from unauthorized access. Participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Block and Stream Ciphers, AES, Hash algorithms including MD5, SHA1,SHA2 and SHA 3, Asymmetric cryptography including thorough descriptions of RSA,ECC and to apply the algorithms in Applications, Networks, E-mail Security, Database Encryption and Public Key Infrastructure.
Hands-on Labs
This certificate course includes hands-on labs for each topic. You’ll need to successfully finish the labs for each topic before you proceed to the next topic.
Earn a Certificate
When you finish the course and complete the hands-on labs for each topic, you’ll earn a certificate that you can share with prospective employers and your professional network.
Course Reviews
No Reviews found for this course.