About this Specialization
Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience.
From | University of Colorado System via Coursera |
---|---|
Hours | 40 |
Instructors | Sang-Yoon Chang, William Bahn, Richard White |
Language | English |
Subjects | Programming Mathematics IT & Networking |
Similar Courses
Sorted by relevance
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).
Electronic Component Sales $58k
Electronic Component Salesman $59k
Specialist in Essential Oils $66k
Essential Service Broker $66k
Component Engineer-Mechanical $69k
Senior Component Technician $81k
Component Eng $99k
Component Design Engineer 3 $106k
Component/Test Engineer $111k
Component/Manufacturing Engineer $112k
Senior Component Engineer 2 $114k
Component Design Engineer 2 $121k
Courses in this Specialization
Listed in the order in which they should be taken
Starts | Course Information | |
---|---|---|
Jun |
Classical Cryptosystems and Core Concepts Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of... Coursera | University of Colorado System |
Save
|
Jun |
Mathematical Foundations for Cryptography Welcome to Course 2 of Introduction to Applied Cryptography. In this course, you will be introduced to basic mathematical principles and functions that form the foundation for... Coursera | University of Colorado System |
Save
|
Jun |
Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the... Coursera | University of Colorado System |
Save
|
Jun |
Asymmetric Cryptography and Key Management Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as... Coursera | University of Colorado System |
Save
|
&
From | University of Colorado System via Coursera |
---|---|
Hours | 40 |
Instructors | Sang-Yoon Chang, William Bahn, Richard White |
Language | English |
Subjects | Programming Mathematics IT & Networking |
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).
Electronic Component Sales $58k
Electronic Component Salesman $59k
Specialist in Essential Oils $66k
Essential Service Broker $66k
Component Engineer-Mechanical $69k
Senior Component Technician $81k
Component Eng $99k
Component Design Engineer 3 $106k
Component/Test Engineer $111k
Component/Manufacturing Engineer $112k
Senior Component Engineer 2 $114k
Component Design Engineer 2 $121k
Similar Courses
Sorted by relevance