Search result for Ciphers Online Courses & Certifications
Get Course Alerts by Email
Symmetric Cryptography
by Sang-Yoon Chang- 4.6
Approx. 13 hours to complete
Then, we build on product ciphers (using both substitution and transposition/permutation) to describe modern block ciphers and review the widely used cipher algorithms in DES, 3-DES, and AES. Lastly, we enable the use of block ciphers to support variable data length by introducing different modes of block cipher operations in ECB, CBC, CFB, OFB, and CTR modes....
Introduction to Encryption and Cryptography
by Janina A- 0.0
2
Encryption and substitution ciphers Substitution ciphers...
Free
TOTAL: Conversation on Cryptography: w/ Mike Meyers
by Total Seminars • 750,000+ Enrollments- 4.7
2.5 hours on-demand video
Caesar and Vigenere ciphers - These fascinating ciphers form part of the basic foundation of cryptography, back before the digital age when militaries, powerful leaders, and spies had to pass messages that couldn't be deciphered if they fell into enemy hands....
$16.99
Cryptography from Scratch| Master Cryptography in Java
by Luke's Programming School- 3.8
2 hours on-demand video
Then I show you first simple ciphers (Substitution Cipher, Caesar Cipher, Affine Cipher), and by understanding these you should be able to know what cryptography is all about, and what not to do, because not only I explain how these ciphers works....
$14.99
An Introduction to Cryptography
by James Shuttleworth , Antal Goldschmidt , Derrick Newton , Christo Panchev- 0.0
2
Explore how code breakers and spies influenced cryptography and investigate the role it plays in modern secure communication. The mathematical concepts underpinning cryptographyClassical cryptography and historical ciphersThe basics of cryptanalysisRandom number generationHashing...
Free
Cyber Attack Countermeasures
by Dr. Edward G. Amoroso- 4.8
Approx. 19 hours to complete
The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography....
Cryptography: Boolean functions and related problems
by Kutsenko Aleksandr , Anastasiya Gorodilova , Natalia Tokareva , Stjepan Picek , George Pintus- 4.3
Approx. 5 hours to complete
Boolean functions in cryptographic ciphers...
Related searches
Classical Cryptosystems and Core Concepts
by William Bahn , Richard White , Sang-Yoon Chang- 4.6
Approx. 12 hours to complete
Codes and Ciphers Lecture Slide - Codes and Ciphers Frequency Analysis of Monoalphabetic Ciphers Frequency Analysis of Monoalphabetic Ciphers - Example Key Length Determination in Polyalphabetic Ciphers Lecture Slide - Frequency Analysis of Monoalphabetic Ciphers - Single-Character Frequencies Lecture Slide - Frequency Analysis for Monoalphabetic Ciphers - Example Lecture Slide - Key Length Determination in Polyalphabetic Ciphers...
Data Science: Natural Language Processing (NLP) in Python
by Lazy Programmer Inc.- 4.6
12 hours on-demand video
Applications: decrypting ciphers, spam detection, sentiment analysis, article spinners, and latent semantic analysis. In this course you will build MULTIPLE practical systems using natural language processing, or NLP - the branch of machine learning and data science that deals with text and speech. All the materials for this course are FREE....
$19.99
Applied Cryptography
by Dave Evans- 0.0
Approx. 2 months
lesson 1 Perfect Ciphers What makes certain ciphers perfect....
Free