このコースについて
3,356 最近の表示

100%オンライン

自分のスケジュールですぐに学習を始めてください。

柔軟性のある期限

スケジュールに従って期限をリセットします。

初級レベル

約9時間で修了

推奨:This is Course 1 in a 4-course specialization. Estimated workload: 15-hours per week....

英語

字幕:英語

100%オンライン

自分のスケジュールですぐに学習を始めてください。

柔軟性のある期限

スケジュールに従って期限をリセットします。

初級レベル

約9時間で修了

推奨:This is Course 1 in a 4-course specialization. Estimated workload: 15-hours per week....

英語

字幕:英語

シラバス - 本コースの学習内容

1
1時間で修了

Specialization Introduction

This module covers an introduction of the specialization and instructors, covers what to expect from this educational experience and also, an introduction to the course Classical Cryptosystems and Core Concepts.

...
3件のビデオ (合計12分), 2 readings
3件のビデオ
Course Introduction2 分
About the Instructor6 分
2件の学習用教材
About the Course10 分
About the Instructor10 分
4時間で修了

Cryptographic Tidbits

In this module we present an introduction to cryptography, differentiate between codes and ciphers, describe cryptanalysis, and identify the guiding principles of modern cryptography. After completing this course you will be able to read material related to cryptographic systems, understanding the basic terminology and concepts. You will also have an appreciation for the historical framework of modern cryptography and the difficulty of achieving its aims.

...
4件のビデオ (合計55分), 9 readings, 2 quizzes
4件のビデオ
Codes and Ciphers15 分
What is Cryptanalysis?15 分
Modern Guiding Principles in Cryptography12 分
9件の学習用教材
Lecture Slide - What is Cryptography?30 分
Additional Reference Material10 分
Lecture Slide - Codes and Ciphers10 分
L2: Additional Reference Material10 分
Lecture Slide - What is Cryptanalysis10 分
L3: Additional Reference Material10 分
Lecture Slide - Modern Guiding Principles10 分
L4: Additional Reference Material10 分
Video - Cryptography for the masses: Nadim Kobeissi16 分
2の練習問題
Practice Assessment - Cryptographic Tidbits12 分
Graded Assessment - Cryptographic Tidbits20 分
2
4時間で修了

Cryptanalysis

Delving deeper into cryptanalysis, in this module we will discuss different types of attacks, explain frequency analysis and different use cases, explain the significance of polyalphabetical ciphers, and discuss the Vigenere Cipher. When you have completed this module, you will have an appreciation of the different types of attacks and under what kinds of situations each might be applicable.

...
6件のビデオ (合計62分), 11 readings, 2 quizzes
6件のビデオ
Frequency Analysis of Monoalphabetic Ciphers11 分
Multi-Character Frequency Analysis10 分
Frequency Analysis of Monoalphabetic Ciphers - Example11 分
Key Length Determination in Polyalphabetic Ciphers11 分
Example of Cracking a Vigenere Cipher5 分
11件の学習用教材
Lecture Slide - Types of Cryptanalytic Attacks10 分
Video - Why the NSA is breaking our encryption -- and why we should care | Matthew Green10 分
L5: Additional Reference Material10 分
Lecture Slide - Frequency Analysis of Monoalphabetic Ciphers - Single-Character Frequencies10 分
L6: Additional Reference Material10 分
Lecture Slide - Multi-Character Frequencies Analysis10 分
Lecture Slide - Frequency Analysis for Monoalphabetic Ciphers - Example10 分
L8: Additional Reference Material10 分
Lecture Slide - Key Length Determination in Polyalphabetic Ciphers10 分
L9: Additional Reference Material10 分
Lecture Slide - Example of Cracking a Vigenere Cipher10 分
2の練習問題
Practice Assessment - Cryptanalysis28 分
Graded Assessment - Cryptanalysis20 分
3
3時間で修了

Hash Functions

Continuing on our exploration of the fundamental concept of cryptography, this module will explain the Hash Function, its purpose and application, potential attack vectors, and the importance of hash functions on cryptographic design. Upon completion you will be able to understand the role that hash functions play in cryptography and how cryptographic hash functions differ from other types of hash functions.

...
5件のビデオ (合計55分), 8 readings, 2 quizzes
5件のビデオ
How are Cryptographic Hash Function used15 分
How are Cryptographic Hash Functions Attacked? Part I8 分
How are Cryptographic Hash Function Attacked? Part II10 分
Properties of a Cryptographic Hash Function10 分
8件の学習用教材
Lecture Slide - What is a Hash Function?10 分
L11: Additional Reference Material10 分
Lecture Slide - How are Cryptographic Hash Functions Used?10 分
Lecture Slide - How are Cryptographic Hash Functions Attacked? Part I10 分
L13: Additional Reference Material10 分
Lecture Slide - How are Cryptographic Hash Function Attacked? Part II10 分
L14: Additional Reference Material10 分
Lecture Slide - What Properties Should a Cryptographic Hash Function Have?10 分
2の練習問題
Practice Assessment - Hash Functions20 分
Graded Assessment - Hash Functions20 分
4.6
19件のレビューChevron Right

50%

コース終了後に新しいキャリアをスタートした

50%

コースが具体的なキャリアアップにつながった

Classical Cryptosystems and Core Concepts からの人気レビュー

by MRNov 7th 2017

The lectures were educational, and interesting without speaking down to you. I learned a lot without being overwhelmed

by AGJan 14th 2019

Thank you for taking the time to upload your videos. I hope you create a capstone course.

講師

Avatar

William Bahn

Lecturer
Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science
Avatar

Sang-Yoon Chang

Assistant Professor
Computer Science

University of Colorado Systemについて

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Introduction to Applied Cryptographyの専門講座について

Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience....
Introduction to Applied Cryptography

よくある質問

  • 修了証に登録すると、すべてのビデオ、テスト、およびプログラミング課題(該当する場合)にアクセスできます。ピアレビュー課題は、セッションが開始してからのみ、提出およびレビューできます。購入せずにコースを検討することを選択する場合、特定の課題にアクセスすることはできません。

  • コースに登録する際、専門講座のすべてのコースにアクセスできます。コースの完了時には修了証を取得できます。電子修了証が成果のページに追加され、そこから修了証を印刷したり、LinkedInのプロフィールに追加したりできます。コースの内容の閲覧のみを希望する場合は、無料でコースを聴講できます。

さらに質問がある場合は、受講者向けヘルプセンターにアクセスしてください。