Search result for Encryption and decryption algorithms Online Courses & Certifications
Get Course Alerts by Email
Mathematical Foundations for Cryptography
by William Bahn , Richard White , Sang-Yoon Chang- 4.6
Approx. 14 hours to complete
In this course, you will be introduced to basic mathematical principles and functions that form the foundation for cryptographic and cryptanalysis methods. These principles and functions will be helpful in understanding symmetric and asymmetric cryptographic methods examined in Course 3 and Course 4. CRT Capabilities and Limitations Video - James Lyne: Cryptography and the power of randomness...
Managing Secrets with Hashicorp Vault
by Chris Parent- 0.0
5.5 hours on-demand video
Governance is a process that defines how secrets are created, protected, rotated, distributed, revoked, and destroyed. The governance process may also cover who can access what secrets and when. You don't need to be a security professional or understand all the details behind encryption algorithms to learn Vault. Securely deploy Vault into Development and Production environments...
$14.99
Data Privacy Fundamentals
by Woodrow HartzogTop Instructor , Todd RelafordTop Instructor- 4.8
Approx. 9 hours to complete
This course is designed to introduce data privacy to a wide audience and help each participant see how data privacy has evolved as a compelling concern to public and private organizations as well as individuals. Transparency and Encryption: Christo Wilson Personalization, Algorithms and Machine Learning: Alan Mislove Privacy and Information Law with Neil Richards...
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk. Incident Response and Recovery Incident Handling: IDS and IPS Incident Handling: SSL Decryption Devices...
Teaching Impacts of Technology: Data Collection, Use, and Privacy
by Beth Simon- 4.6
Approx. 13 hours to complete
In this course you’ll focus on how constant data collection and big data analysis have impacted us, exploring the interplay between using your data and protecting it, as well as thinking about what it could do for you in the future. Engagement and Assessment Goals Keeping Information Secure on the Internet: Hashing and Encryption...
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. Information and security This video introduces the core information security services and tools provided by cryptography. Algorithms and keys More about producers and products Professional and ethical considerations...
MikroTik Security Engineer with LABS
by Maher Haddad- 0.0
12.5 hours on-demand video
Become a MikroTik Security Professional and be ready for the MikroTik MTCSE exam ***This course is not officially sponsored by MikroTik and not an authorized course by MikroTik. So by taking this course, you will cover all the topics of the MikroTik MTCSE track and you will be ready for the exam....
$13.99
Related searches
プログラミングしながら学ぶコンピュータサイエンス入門 : Introduction to Computer Science and Programming
by Osamu Watanabe- 0.0
4 Weeks
AIやコンピュータでやっていることは「計算」です。超入門的プログラミングで「計算」の設計法を体験しながら,コンピュータサイエンスの基礎を学びます。“Computations” are what computers, including those utilizing Artificial Intelligent algorithms are actually doing. Learn about the basic and key concepts of computer science while experiencing how to program and design “computational algorithms. ・Basic information security: encryption, decryption, and crypto-breaking ・Private key cryptosystems and public key cryptosystems ・Installation of software and the programming environments (editor, shell)...
$49
The Complete C# and Object-Oriented Programming Course
by Ahmad Mohey- 4.2
23.5 hours on-demand video
The one and only course you need to learn C# 8 and object-oriented programming (C# From A To Z | Source Code Included) This course will cover different encryption and decryption methods, plus explaining the theory of cryptography. Understand the difference between pass by reference and pass by value. How to use optional and named arguments....
$17.99
Ethical Hacking and Network Security from Scratch 2021
by Andrei Dumitrescu- 4.7
15 hours on-demand video
Learn how Hackers hack networks and devices and how to secure them. The world is changing, constantly, and at a fast pace! The technology-driven future in which we’ll live is filled with promise but also challenges. This Ethical Hacking course is really different! You’ll learn what really matters and you’ll get the skills to get ahead and gain an edge....
$18.99