Cybersecurity and Secure Software Design
Instructors: Vinayak Tanksale +1 more
Skills you'll gain
There are 5 modules in this course
Upon successfully completing this course, the student should be able to: describe symmetric and asymmetric cryptographic algorithms, demonstrate security application development skills, compare key distribution algorithms, compare authentication techniques, explain transport layer security, and demonstrate proficiency in the security of systems and applications such as email, networking, database, and operating systems.
Number Theory
Classical Encryption
Symmetric Encryption and DES
Advanced Encryption Standard
Explore more from Computer Security and Networks
©2025 ementorhub.com. All rights reserved