Search result for Key algorithms Online Courses & Certifications
Get Course Alerts by Email
Public Key Cryptography From Scratch In Python
by Sefik Ilkin Serengil- 3.3
2.5 hours on-demand video
Lean back on public key cryptography and leave the rest to it. Hands on programming course for public key infrastructure Public key cryptography empowers data encryption, secure data transmission, digital signatures, authentication, privacy or confidentiality and key exchange mechanisms for symmetric key algorithms. This course covers the most common public key algorithms: Diffie Hellman, RSA, ElGamal and DSA....
$9.99
Blockchain Basics
by Bina Ramamurthy- 4.6
Approx. 16 hours to complete
Algorithms & Techniques Algorithms & Techniques: Public-Key Cryptography REQUIRED Quiz Resources and Directions: Algorithms & Techniques - Week 3 Algorithms & Techniques - Week 3 Blockchain Basics: Key Takeaways...
Cryptography
by (ISC)² Education & Training- 4.8
Approx. 14 hours to complete
Define key management concepts Define Public Key Infrastructure Identify processes for key administration and validation Fundamental Concepts of Cryptography: Key Concepts and Definitions Fundamental Concepts of Cryptography: Key Concepts and Definitions Fundamental Concepts of Cryptography: Key Concepts and Definitions Fundamental Concepts of Cryptography: Key Concepts and Definitions Operate and Implement Cryptographic System: Key Storage and Destruction...
Algorithms for DNA Sequencing
by Ben Langmead, PhD , Jacob Pritt- 4.7
Approx. 12 hours to complete
We will learn computational methods -- algorithms and data structures -- for analyzing DNA sequencing data. We will use Python to implement key algorithms and data structures and to analyze real genomes and DNA sequencing datasets. Welcome to Algorithms for DNA Sequencing Algorithms for assembly...
Unordered Data Structures
by Wade Fagen-Ulmschneider- 4.7
Approx. 21 hours to complete
The Unordered Data Structures course covers the data structures and algorithms needed to implement hash tables, disjoint sets and graphs. For example, a hash table provides immediate access to data indexed by an arbitrary key value, that could be a number (such as a memory address for cached memory), a URL (such as for a web cache) or a dictionary....
Cloud Computing Concepts, Part 1
by Indranil Gupta- 4.4
Approx. 23 hours to complete
Week 5: Classical Distributed Algorithms...
Cloud Computing Concepts: Part 2
by Indranil Gupta- 4.6
Approx. 20 hours to complete
Week 1: Course Orientation and Classical Distributed Algorithms Continued...
Related searches
Python Searching & Sorting Algorithms - A Practical Approach
by Estefania Cassingena Navone- 4.5
6 hours on-demand video
Implement searching and sorting Algorithms in Python and learn how they work through engaging animations and projects. Learn how to implement Searching and Sorting algorithms in Python. Searching and Sorting algorithms is a key topic commonly asked during technical interviews. Being able to explain how the algorithms work is a key skill during interviews....
$12.99
Applied Quantum Computing III: Algorithm and Software
by Pramey Upadhyaya , Avinash Rustagi- 0.0
5 Weeks
The goal of part III is to discuss some of the key domain-specific algorithms that are developed by exploiting the fundamental quantum phenomena (e. A key aspect of the course is to provide hands-on training for running (few qubit instances of) the quantum algorithms on present-day quantum hardware. Quantum Fourier transform and search algorithms...
$750
Modern C++ Concurrency in Depth ( C++17/20)
by Kasun Liyanage- 0.0
9.5 hours on-demand video
Memory model is the key part of any language, and the performance of all the functionalities depends on that language memory model. Proper lock free implementations of data structures and algorithms will provide unprecedented performance output. Let me listed down key aspects we cover in this course below....
$15.99