Search result for Practical applications of cryptography Online Courses & Certifications
Get Course Alerts by Email
Full Stack Web Developer
by Amy Hua , Caryn McCarthy , Gabriel Ruttner , Kennedy Behrman- 0.0
4 Months
Becoming a software engineer is one of the best career moves you can make. apply what you’ve learned in the lessons and demonstrate to potential employers that you have practical full-stack development skills. Completion of the Full Stack Web Developer Nanodegree program will give you the tools needed to perform well in a variety of developer roles....
Number Theory and Cryptography
by Alexander S. Kulikov , Michael Levin , Владимир Подольский- 4.5
Approx. 19 hours to complete
Some of us like to count, others hate it, but any person uses numbers everyday to buy things, pay for services, estimated time and necessary resources. By the end, you will be able to apply the basics of the number theory to encrypt and decrypt messages, and to break the code if one applies RSA carelessly....
AI for Business Leaders
by William Ross , Luis Serrano , Josh Bernhard- 0.0
4 - 8 Weeks
93% of high growth companies with double digit organic growth plan to implement AI into their business within the next one to three years, but 94% of enterprises struggle to understand how to implement AI in their organizations. You’ll develop foundational technical knowledge of machine learning and the business applications of artificial intelligence across industries....
Cryptography Beginners Guide with openSSL
by Ofer Shmueli- 4.3
1.5 hours on-demand video
Learn and apply cryptography techniques using openSSL . OpenSSL and Cryptography - Beginners Guide I've not done much in the way of cryptography for many years because of the jobs that I've held not requiring it. I will teach you the theory and the practical usage. WHY openSSL cryptography ? public key cryptography...
$18.99
Cryptography: Boolean functions and related problems
by Kutsenko Aleksandr , Anastasiya Gorodilova , Natalia Tokareva , Stjepan Picek , George Pintus- 4.3
Approx. 5 hours to complete
The course invites you to learn more about cryptography; you'll learn some important math which stands behind the ciphers, and defines how resistant the particular cipher will be to different types of attacks. The beginning of the Russian cryptography Bent functions: results and applications Algebraic normal form of a bent function...
Network Security - Protocols
by Aspen Olmsted- 0.0
5 Weeks
Learn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security. Students are provided with a broad understanding of cryptography, from its classical applications dating from the Roman empire to modern cryptography, including the public key cryptography and hashing techniques today....
$166
Techniques of Design-Oriented Analysis
by Dr. Dragan Maksimovic- 4.8
Approx. 12 hours to complete
This is Course #2 in the Modeling and Control of Power Electronics course sequence. The course is focused on techniques of design-oriented analysis that allow you to quickly gain insights into models of switching power converters and to translate these insights into practical converter designs. Practical applications of EET Practical Design of Damping...
Related searches
More Fun with Prime Numbers
by Tetsushi Ito- 0.0
5 Weeks
Take a deep dive intoPrime Numbers - one of the most mysterious and important subjects in mathematics! All the lecture videos will be renewed, and a new topic on cryptography will be added so as to enliven and satisfy even the students who took the previous course. Applications of Prime Numbers to Cryptography...
$49
More Fun with Prime Numbers
by Tetsushi Ito- 0.0
5 Weeks
Take a deep dive into Prime Numbers - one of the most mysterious and important subjects in mathematics! All the lecture videos will be renewed, and a new topic on cryptography will be added so as to enliven and satisfy even the students who took the previous course. Applications of Prime Numbers to Cryptography...
$49
Mathematical Foundations for Cryptography
by William Bahn , Richard White , Sang-Yoon Chang- 4.6
Approx. 14 hours to complete
Welcome to Course 2 of Introduction to Applied Cryptography. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability. Video - James Lyne: Cryptography and the power of randomness The Science of Encryption...