About this Course
최근 조회 4,778

다음 전문 분야의 1개 강좌 중 1번째 강좌:

100% 온라인

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 마감일

일정에 따라 마감일을 재설정합니다.

중급 단계

완료하는 데 약 9시간 필요

권장: 4 hours/week...

영어

자막: 영어

다음 전문 분야의 1개 강좌 중 1번째 강좌:

100% 온라인

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 마감일

일정에 따라 마감일을 재설정합니다.

중급 단계

완료하는 데 약 9시간 필요

권장: 4 hours/week...

영어

자막: 영어

강의 계획 - 이 강좌에서 배울 내용

1
완료하는 데 4시간 필요

Basic Cryptography

In this module we learn the basic concepts and principles of crytography, introduce the basic concept of cryptoanalysis using mono-alphabetic substitution cipher as an example, and discuss the one-time-pad and quantum key distribution concepts.

...
6 videos (Total 50 min), 5 readings, 1 quiz
6개의 동영상
Basic Cryptography10m
Kerckhoff's Principle9m
CryptoAnalysis of Monoalphabetic Substitution Cipher13m
Columnar Transposition Ciphers4m
One-Time Pad & Quantum Key Distribution10m
5개의 읽기 자료
Introduction to cryptology, Part1, from IBM developerWorks30m
What makes a cryptographic protocol strong?30m
Basic Cryptoanalysis. Three Basic Variations of Cryptoanalysis or Cipher Attack:30m
Columnar transposition Ciphers30m
One time pad encryption30m
1개 연습문제
Exam 2.130m
2
완료하는 데 6시간 필요

Symmetric Key Cryptography

In this module we present the basic mechanism of symmetric key crytography algorithms, discuss the DES and AES standard, describe the criteria for selecting AES standard, present the block cipher operating modes and discuss how the block swapping attacks and replay attacks can be prevented and detected.

...
6 videos (Total 55 min), 5 readings, 2 quizzes
6개의 동영상
Advanced Encryption Standard9m
AES Expansion/Schedule4m
AES Selection Criteria13m
Dealing with Block Swapping and Replay Attacks7m
Block Cipher Mode of Operation11m
5개의 읽기 자료
Symmetric Key Encryption and DES15m
AES: The Advanced Encryption Standard by Avi Kak2h
Section 8.8 Key Expansion Algorithm from Prof. Section 8.8 Key Expansion Algorithm Lecture Note15m
Report on the Development of the Advanced Encryption Standard (AES)15m
Block cipher mode of operation15m
1개 연습문제
Exam 2.2. Symmetric Key Algorithm20m
3
완료하는 데 5시간 필요

Asymmetric Key Cryptography

In this module we will learn the modular arithmetic, the Euler Totient Theorm, the RSA Asymmetric Crypto Algorithm, use OpenSSL to realize the basic operations of RSA Crypto Algorithm, and Diffie-Hellman Symmetric Key Exchange Protocol to derive session keys.

...
5 videos (Total 58 min), 5 readings, 2 quizzes
5개의 동영상
Modular Arithmetic13m
Euler Totient Theorem13m
RSA Asymmetric Crypto Algorithm17m
Understanding RSA with OpenSSL6m
5개의 읽기 자료
Diffie-Hellman Key Exchange Protocol20m
Modular Arithemetic20m
Euler's Totient Theorem20m
RSA Cryptosystem10m
OpenSSL Command-Line HOWTO10m
1개 연습문제
Exam 2.3. Asymmetric Key Cryptography20m
4
완료하는 데 2시간 필요

Develop Secure Programs with Crypto API

In this module, we learn how to use Crypto API to write secure programs for encrypting and decrypting documents, and for signing and verify documents. We then apply the techniques to enhance the registration process of a web site which ensures the account created is actually belonging to the owner of the email account the request profile.

...
3 videos (Total 45 min), 3 readings, 1 quiz
3개의 동영상
Use Crypto API to Sign and Verify9m
Mini Capstone: Enhance Registration Web Site Security20m
3개의 읽기 자료
PHP encrypt and decrypt crypto api20m
PHP Openssl sign and verify API20m
Ashley Madison Case30m
1개 연습문제
Exam 2.4. Develop Secure Programs with Crypto API30m
4.1
3개의 리뷰Chevron Right

50%

이 강좌를 통해 확실한 경력상 이점 얻기

Basic Cryptography and Programming with Crypto API의 최상위 리뷰

대학: LBApr 2nd 2018

The course content is excellent. It would be much better if some errors (like misspelled words, improper capitalization etc) would be corrected

강사

Avatar

Edward Chow

Professor
Computer Science

콜로라도 대학교 정보

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Fundamentals of Computer Network Security 전문 분야 정보

This specialization in intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills. Through four courses, we will cover the Design and Analyze Secure Networked Systems, Develop Secure Programs with Basic Cryptography and Crypto API, Hacking and Patching Web Applications, Perform Penetration Testing, and Secure Networked Systems with Firewall and IDS, which will prepare you to perform tasks as Cyber Security Engineer, IT Security Analyst, and Cyber Security Analyst. The learning outcomes of this specialization include: you should be able to create public/private keys, certificate requests, install/sign/verify them for web server and client authentication, secure emails, and code signing. you should be able to write secure web apps with Crypto API to implement the confidentiality, integrity, and availability basic security services. you should be able to hack web applications with vulnerabilities and patch them. you should be able to apply penetration testing tool to exploit vulnerable systems. you should be able to crack passwords given the hashes in password file using AWS P2 GPU. you should be able to configure firewall and IDS for secure network systems you should be able to specify effective security policies and implement efficient enforcement procedures by applying security design principles for securing network systems....
Fundamentals of Computer Network Security

자주 묻는 질문

  • 강좌에 등록하면 바로 모든 비디오, 테스트 및 프로그래밍 과제(해당하는 경우)에 접근할 수 있습니다. 상호 첨삭 과제는 이 세션이 시작된 경우에만 제출하고 검토할 수 있습니다. 강좌를 구매하지 않고 살펴보기만 하면 특정 과제에 접근하지 못할 수 있습니다.

  • 강좌를 등록하면 전문 분야의 모든 강좌에 접근할 수 있고 강좌를 완료하면 수료증을 취득할 수 있습니다. 전자 수료증이 성취도 페이지에 추가되며 해당 페이지에서 수료증을 인쇄하거나 LinkedIn 프로필에 수료증을 추가할 수 있습니다. 강좌 내용만 읽고 살펴보려면 해당 강좌를 무료로 청강할 수 있습니다.

궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.