We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

فك التشفير باستخدام لغة البرمجة بايثون

Ali Karaki

في هذه الدورة التدريبية القائمة على المشروع والتي تستغرق ساعة واحدة، ستتعلم مفهوم فك التشفير باستخدام لغة البرمجة بايثون، بالاضافة الى التعرف على انواع المعايير المستخدمة بالاضافة الى بعض الامثلة.

Read more

في هذه الدورة التدريبية القائمة على المشروع والتي تستغرق ساعة واحدة، ستتعلم مفهوم فك التشفير باستخدام لغة البرمجة بايثون، بالاضافة الى التعرف على انواع المعايير المستخدمة بالاضافة الى بعض الامثلة.

في نهاية هذه الدورة، ستكون قادراً على فك التشفير في مختلف المعايير المستخدمة بواسطة بايثون.

Enroll now

What's inside

Syllabus

Module 1
في هذه الدورة التدريبية القائمة على المشروع والتي تستغرق ساعة واحدة، ستتعلم مفهوم فك التشفير باستخدام لغة البرمجة بايثون، بالاضافة الى التعرف على انواع المعايير المستخدمة بالاضافة الى بعض الامثلة. في نهاية هذه الدورة، ستكون قادراً على فك التشفير في مختلف المعايير المستخدمة بواسطة بايثون.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Geared towards people with no knowledge of cryptography
Provides examples to illustrate the concepts
Covers a single topic in one hour
Uses Python, which is commonly used in cryptography

Save this course

Save فك التشفير باستخدام لغة البرمجة بايثون to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for فك التشفير باستخدام لغة البرمجة بايثون. These are activities you can do either before, during, or after a course.

Career center

Learners who complete فك التشفير باستخدام لغة البرمجة بايثون will develop knowledge and skills that may be useful to these careers:
Cryptography Researcher
Cryptography Researchers design, develop, and analyze cryptographic algorithms, protocols, and systems. They use mathematical and computational techniques to ensure the security and privacy of data and communications. This course provides a foundation in the fundamental concepts of cryptography, including encryption, decryption, and cryptanalysis. It also introduces students to different types of cryptographic standards, such as AES, RSA, and ECC. This knowledge can be directly applied to the design and analysis of cryptographic systems, making this course a valuable resource for aspiring Cryptography Researchers.
Network Security Analyst
Network Security Analysts are responsible for protecting computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They use a variety of tools and techniques to identify and mitigate security risks, including firewalls, intrusion detection systems, and vulnerability scanners. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect data and communications from unauthorized access. It also introduces students to different types of cryptographic standards, which are used to secure network traffic and data storage.
Software Engineer
Software Engineers design, develop, and maintain software applications. They use a variety of programming languages and tools to create software that meets the needs of users. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect software applications from unauthorized access and modification. It also introduces students to different types of cryptographic standards, which are used to secure software code and data.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect information systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. They use a variety of tools and techniques to identify and mitigate security risks, including cryptography, firewalls, and intrusion detection systems. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect data and communications from unauthorized access. It also introduces students to different types of cryptographic standards, which are used to secure information systems and data.
Cybersecurity Analyst
Cybersecurity Analysts protect computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They use a variety of tools and techniques to identify and mitigate security risks, including cryptography, firewalls, and intrusion detection systems. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect computer networks and systems from unauthorized access. It also introduces students to different types of cryptographic standards, which are used to secure network traffic and data storage.
Data Scientist
Data Scientists use data to solve problems and make predictions. They use a variety of statistical and machine learning techniques to analyze data and identify patterns. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect data from unauthorized access and modification. It also introduces students to different types of cryptographic standards, which are used to secure data storage and transmission.
IT Auditor
IT Auditors evaluate the security of computer systems and networks. They use a variety of tools and techniques to identify and mitigate security risks, including cryptography, firewalls, and intrusion detection systems. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect data and communications from unauthorized access. It also introduces students to different types of cryptographic standards, which are used to secure IT systems and data.
Forensic Computer Analyst
Forensic Computer Analysts investigate computer crimes and recover evidence from computer systems. They use a variety of tools and techniques to identify and analyze digital evidence, including cryptography, steganography, and data carving. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect data from unauthorized access and modification. It also introduces students to different types of cryptographic standards, which are used to secure digital evidence.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They use a variety of tools and techniques to identify and mitigate security risks, including cryptography, firewalls, and intrusion detection systems. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect data and communications from unauthorized access. It also introduces students to different types of cryptographic standards, which are used to secure IT systems and data.
Risk Analyst
Risk Analysts identify and assess risks to organizations, including financial, operational, and reputational risks. They use a variety of tools and techniques to analyze risks and develop mitigation strategies, including cryptography, risk modeling, and scenario planning. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect data and communications from unauthorized access. It also introduces students to different types of cryptographic standards, which are used to secure risk analysis data and models.
Compliance Officer
Compliance Officers ensure that organizations comply with applicable laws and regulations. They use a variety of tools and techniques to identify and mitigate compliance risks, including cryptography, risk management, and internal controls. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect data and communications from unauthorized access. It also introduces students to different types of cryptographic standards, which are used to secure compliance data and documentation.
Business Analyst
Business Analysts analyze business processes and identify opportunities for improvement. They use a variety of tools and techniques to gather and analyze data, including cryptography, data mining, and process mapping. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect data and communications from unauthorized access. It also introduces students to different types of cryptographic standards, which are used to secure business data and analysis.
Project Manager
Project Managers plan, execute, and close projects. They use a variety of tools and techniques to manage project scope, schedule, and budget, including cryptography, risk management, and communication management. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect project data and communications from unauthorized access. It also introduces students to different types of cryptographic standards, which are used to secure project plans and documentation.
Technical Writer
Technical Writers create and maintain technical documentation, such as user manuals, white papers, and training materials. They use a variety of tools and techniques to communicate complex technical information clearly and effectively, including cryptography, style guides, and content management systems. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect technical documentation from unauthorized access. It also introduces students to different types of cryptographic standards, which are used to secure technical data and documentation.
Data Analyst
Data Analysts collect, analyze, and interpret data to identify trends and patterns. They use a variety of tools and techniques to gather and analyze data, including cryptography, data mining, and statistical analysis. This course provides a foundation in the principles of cryptography, which is essential for understanding how to protect data from unauthorized access. It also introduces students to different types of cryptographic standards, which are used to secure data storage and transmission.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in فك التشفير باستخدام لغة البرمجة بايثون.
هذا الكتاب هو أحد الكتب الشاملة عن تشفير Python، حيث يقدم مقدمة ممتازة حول مفاهيم التشفير الأساسية. الكتاب مفيد أيضًا للمستخدمين الذين لديهم معرفة أساسية بتشفير Python ويرغبون في توسيع نطاق معرفتهم.
هذا الكتاب هو مرجع شامل لتقنيات التشفير الحديثة. يوفر الكتاب خلفية متينة لمفاهيم التشفير الأساسية ويوفر معلومات مفصلة حول خوارزميات التشفير والأنظمة.
هذا الكتاب هو مقدمة شاملة لنظرية التشفير والترميز. يغطي الكتاب مجموعة واسعة من الموضوعات، بما في ذلك التشفير الكلاسيكي والحديث وخوارزميات التشفير والمزيد.
هذا الكتاب هو نص جامعي شامل يغطي مجموعة واسعة من موضوعات التشفير الحديثة. يوفر الكتاب معالجة نظرية وعمليّة لمفاهيم التشفير الأساسية.
هذا الكتاب هو نص جامعي شامل يغطي مجموعة واسعة من موضوعات التشفير والأمن الشبكي. يوفر الكتاب مقدمة جيدة لمفاهيم التشفير الأساسية ويوفر معلومات مفصلة حول بروتوكولات الأمان الشبكي.
هذا الكتاب هو دليل عملي للتشفير. يغطي الكتاب مجموعة واسعة من موضوعات التشفير، بما في ذلك التشفير الكلاسيكي والحديث وخوارزميات التشفير وبروتوكولات الأمان الشبكي.
هذا الكتاب هو مقدمة شاملة لأمن الشبكات. يغطي الكتاب مجموعة واسعة من موضوعات أمن الشبكات، بما في ذلك التشفير وأمن التطبيقات وبروتوكولات الأمان الشبكي.
هذا الكتاب هو مقدمة شاملة لأمن الحوسبة. يغطي الكتاب مجموعة واسعة من موضوعات أمن الحوسبة، بما في ذلك التشفير وأمن الشبكات وأمن أنظمة التشغيل.
هذا الكتاب هو تاريخ شامل للتشفير. يغطي الكتاب تاريخ التشفير من العصور القديمة إلى العصر الحديث.
هذا الكتاب هو نص جامعي شامل يغطي مجموعة واسعة من موضوعات التشفير. يوفر الكتاب معالجة نظرية وعمليّة لمفاهيم التشفير الأساسية.
هذا الكتاب هو مقدمة جيدة لمفاهيم التشفير الأساسية. الكتاب مناسب للمبتدئين الذين ليس لديهم خلفية في التشفير.
هذا الكتاب هو تاريخ شامل للتشفير. يغطي الكتاب تاريخ التشفير من العصور القديمة إلى العصر الحديث.
هذا الكتاب هو مقدمة جيدة لمهندسة اجتماعية. الكتاب مناسب للمبتدئين الذين ليس لديهم خلفية في الهندسة الاجتماعية.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to فك التشفير باستخدام لغة البرمجة بايثون.
إدارة مخاطر الاستثمار
Most relevant
الجمع بين أجزاء متعددة من البيانات في سيكويل
Most relevant
تحسين أداء العمل باستخدام نماذج غوغل
Most relevant
بايثون لعلوم البيانات والذكاء الصناعي
Most relevant
How to implement array based stack in C
Most relevant
تعلم C عن طريق عمل Array-based Stack
Most relevant
المعادلات في مايكروسوفت إكسل الجزء ١ |Formulas in MS...
Most relevant
فهم وإدارة والاستفادة من ملفات الترويسة في لغة البرمجة سي
Most relevant
فهم وإدارة الذاكرة في لغة البرمجة سي
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser