Search result for Practical applications of cryptography Online Courses & Certifications
Get Course Alerts by Email
QC201 : Advanced Math for Quantum Computing
by Kumaresan Ramanathan- 4.5
4 hours on-demand video
This course covers the Math you need to begin learning about quantum algorithms and applications of quantum computing. Basis Vectors & Change of Basis Entanglement in terms of Degrees of Freedom Cryptography with Entanglement Deconstruction of Hermitian and Unitary Matrices into a Sum of Outer Products QUANTUM APPLICATIONS COVERED IN THIS COURSE...
$12.99
Blockchain Technology: A Simple and Quick Introduction
by Arya Sharma- 4.4
1.5 hours on-demand video
various online content surrounding blockchain technology that is too technical and publications explaining specific applications of blockchain technology. Understanding of basic concepts in blockchain technology is important in order to understand specific blockchain applications and its actual economic impact. Blockchain foundationsWhy do we need blockchainHow blockchain worksVisual demo of blockchainTypes of blockchainLimitations of blockchainBlockchain disruptive use casesJob prospects in blockchain...
$12.99
Python and Machine-Learning for Asset Management with Alternative Data Sets
by Gideon OZIK , Sean McOwen- 4.4
Approx. 19 hours to complete
The approach of this course is somewhat unique because while the theory covered is still a main component, practical lab sessions and examples of working with alternative datasets are also key. Lab session: Points of Interest Application: Additional applications of consumption data Additional resources on the interest of real-time corporate sales'measures Lab session: Applications of TF-IDF...
Blockchain An Overview
by Systems Innovation- 4.4
2 hours on-demand video
An Accessible Overview to The Blockchain and Its Many Applications Within Economy, Society and Technology In the last section of the course, we will be looking at specific applications of the blockchain to economy, society, technology, and environment, looking at both existing practical applications and potential future applications....
$12.99
RESTful Web API Design with Node.js - Second Edition
by Packt Publishing- 3.7
2.5 hours on-demand video
Explore the practical side of REST to build data-centric applications with Node RESTful Web APIs allow developers to create unprecedented applications by leveraging the data on the internet. Since JavaScript is the language of the web, building APIs using Node. By the end of this course, you will have a good grasp of APIs, HTTP, REST, OAuth 1....
$12.99
Evaluations of AI Applications in Healthcare
by Tina Hernandez-Boussard , Mildred Cho- 4.5
Approx. 11 hours to complete
With artificial intelligence applications proliferating throughout the healthcare system, stakeholders are faced with both opportunities and challenges of these evolving technologies. Growth of AI in Healthcare Best practices of AI applications to promote fair and equitable healthcare solutions Challenges of regulation of AI applications and which components of a model can be regulated...
Financial Engineering and Risk Management Part II
by Martin Haugh , Garud Iyengar- 4.7
Approx. 17 hours to complete
The emphasis of FE & RM Part II will be on the use of simple stochastic models to (i) solve portfolio optimization problems (ii) price derivative securities in various asset classes including equities and credit and (iii) consider some advanced applications of financial engineering including algorithmic trading and the pricing of real options....
Related searches
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
This course covers a wide variety of IT security concepts, tools, and best practices. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. Cryptography Symmetric Cryptography Asymmetric Cryptography Cryptography in Action Cryptography Applications...
Algorithms and Software Engineering for Professionals
by Eduonix Learning Solutions- 3.6
7.5 hours on-demand video
Understand the core concepts and algorithms of software engineering using Java This course covers important concepts related to data structures and algorithms including the five major categories of algorithms: Cryptography, Compiler Theory, Signal Processing, Data Analysis, and Graph Databases. In addition to covering the theoretical concepts, the course also is packed with examples of practical applications....
$11.99
Cryptographic Hash and Integrity Protection
by Sang-Yoon Chang- 4.5
Approx. 9 hours to complete
This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). This course is a part of the Applied Cryptography specialization. Cryptographic Hash Function Applications Slides for Cryptographic Hash Applications...