This course gives an introduction to the concepts, underlying math, principles and techniques of historic and modern cryptography; ties cryptographic protocols to real-world scenarios and gives a necessary understanding of issues related to information security in general.
You'll Learn To
Use hash functions appropriately
Encrypt with symmetric (shared secret key) ciphers
Encrypt with asymmetric (public-key) ciphers
Digitally sign data
Examine the security of cryptographic algorithms
Consider information security objectives
Employ the right cryptographic protocols in information security
Combine different types of algorithms in complex cryptographic systems
ABOUT THIS INTERACTIVE COURSE
It's free and easy to get started with open interactive courses using the Wolfram Cloud—sign in with your Wolfram ID or create one. No plan is required. This full interactive course includes video lessons, quizzes and a scratch notebook, all in an easy-to-use interface. A certificate of course completion is available. From the interactive course, click Track My Progress to chart your certification progress as you go.