About This Specialization

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.

4 Courses
Follow the suggested order or choose your own.
Designed to help you practice and apply the skills you learn.
Highlight your new skills on your resume or LinkedIn.


Projects Overview

Learners will build the logic and the pseudo-code for the widely used cryptographic primitives and algorithms (as opposed to merely knowing how to use them as black boxes), which will enable them to implement the cryptographic primitives in any platforms/language they choose.


For More Information or to Enroll


Created by: