Course description
Applied Cryptography E-learning for new and potential IT professionals
The making and breaking of puzzles is a major part of computing. Cryptography is a big part of everyday life, whether it's paying with a credit card or using the telephone. This program is designed to examine the way in which secrets are shared and written. Unlock the science of secrets and learn how to perfect ciphers.
Do you work at this company and want to update this page?
Is there out-of-date information about your company or courses published here? Fill out this form to get in touch with us.
Upcoming start dates
Who should attend?
This advanced level Applied Cryptography course is designed for programmers and developers in search of a better understanding of cryptography use and implementation.
Find out if this course is right for you - request more information here!
Training content
Training topics for this Applied Cryptography course are divided into 7 lessons and include:
Perfect Ciphers
- What makes certain ciphers perfect, how the Lorenz Cipher was broken
Symmetric Encryption
- Sending messages when two people share a secret
Key Exchange
- Technics to establish a shared secret
Asymmetric Encryption
- Exchanging information using public key cryptosystems
Public Key Protocols
- Encrypted key exchange, certificates, secure commerce
Using Cryptographic Primitives
- How cryptography can be useful for anonymizing communication, voting, and digital cash
Secure Computation
- Computing without exposing data
Costs
It is free to start this Developing Android Apps course
Estimated time for completion assuming 6 hours per week: Approx. 2 months
2-Week Free Trial: Love it or Leave it
All Udacity courses are offered with a two-week free trial. Learners will have plenty of time to make sure that the program fits their needs. If it's not working out for any reason - user can cancel their subscription fee of charge.