About this Course
최근 조회 4,408

다음 전문 분야의 6개 강좌 중 4번째 강좌:

100% 온라인

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 마감일

일정에 따라 마감일을 재설정합니다.

초급 단계

영어

자막: 영어

다음 전문 분야의 6개 강좌 중 4번째 강좌:

100% 온라인

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 마감일

일정에 따라 마감일을 재설정합니다.

초급 단계

영어

자막: 영어

강의 계획 - 이 강좌에서 배울 내용

1
완료하는 데 4시간 필요

Understand and Apply Fundamental Concepts of Cryptography

Module Topics: Encryption Concepts, Methods of Cryptography, Specific Hashing, In Encryption Concepts you will learn about key concepts and definitions and high work factor. In Methods of Cryptography you will learn about stream-based ciphers, stream-based cipher rules, block ciphers, Initialization Vectors (IV) – Why are they needed? basic block cipher modes, evaluation of algorithms, common encryption techniques, encryption algorithm characteristics, and hashing. In Specific Hashing you will learn about message digest (MD) 2, 4, and 5, secure hash algorithm (SHA) 0, 1, and 2, hAVAL, RIPEMD-160, attacks on hashing algorithms and message authentication codes, and the birthday paradox.

...
16 videos (Total 90 min), 15 readings, 1 quiz
16개의 동영상
Fundamental Concepts of Cryptography: Key Concepts and Definitions6m
Fundamental Concepts of Cryptography: Key Concepts and Definitions6m
Fundamental Concepts of Cryptography: Key Concepts and Definitions3m
Fundamental Concepts of Cryptography: Key Concepts and Definitions5m
Fundamental Concepts of Cryptography: Key Concepts and Definitions3m
Fundamental Concepts of Cryptography: Key Concepts and Definitions6m
Fundamental Concepts of Cryptography: Key Concepts and Definitions4m
Fundamental Concepts of Cryptography: Key Concepts and Definitions8m
Fundamental Concepts of Cryptography: High Work Factor5m
Fundamental Concepts of Cryptography: Block Ciphers4m
Fundamental Concepts of Cryptography: Basic Block Cipher Modes5m
Fundamental Concepts of Cryptography: Evaluation of Algorithms7m
Fundamental Concepts of Cryptography: Algorithm Characteristics6m
Fundamental Concepts of Cryptography: Attacks7m
Fundamental Concepts of Cryptography: The Birthday Paradox4m
15개의 읽기 자료
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: Key Concepts and Definitions10m
Fundamental Concepts of Cryptography: High Work Factor10m
Fundamental Concepts of Cryptography: Block Ciphers10m
Fundamental Concepts of Cryptography: Basic Block Cipher Modes10m
Fundamental Concepts of Cryptography: Evaluation of Algorithms10m
Fundamental Concepts of Cryptography: Algorithm Characteristics10m
Fundamental Concepts of Cryptography: Attacks10m
Fundamental Concepts of Cryptography: The Birthday Paradox10m
1개 연습문제
Quiz 120m
2
완료하는 데 4시간 필요

Understand Requirements for Cryptography

Module Topics: Salting, Symmetric/Asymmetric Cryptography, Non-Repudiation, Methods of Cryptanalytic Attack, Data Sensitivity and Regulatory Requirements, End-User Training. In data Sensitivity and Regulatory Requirements. In Symmetric/Asymmetric Cryptography you will learn about encryption and decryption, symmetric cryptography, out-of-band key distribution, advantages and disadvantages of DES, double DES, meet-in-the-middle, triple DES (3DES), advanced encryption standard (AES), Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), and how CCMP works, Rijndael. In Additional algorithms you will learn about International Data Encryption Algorithm (IDEA), CAST, Secure and Fast Encryption Routine (SAFER), Blowfish, Twofish, RC5, RC4, advantages and disadvantages of symmetric algorithms, asymmetric cryptography, asymmetric algorithms, confidential messages, open message, confidential messages with proof of origin, RSA, attacking RSA, Diffie–Hellmann Algorithm, El Gamal, Elliptic Curve Cryptography (ECC), advantages and disadvantages of asymmetric key algorithms, hybrid cryptography, message digests, message authentication code (MAC), HMAC, digital signatures, and Non-Repudiation. In methods of Cryptanalytic Attack you will learn about chosen plain-text, Social engineering for key discovery, brute force, differential cryptanalysis, linear cryptanalysis, Algebraic, rainbow table, ciphertext-only attack, known plaintext, frequency analysis, chosen cipher-text, birthday attack, dictionary attack, replay attack, reverse engineering, and temporary files. In Data Sensitivity and Regulatory Requirements you will learn about data classification examples, protected data examples, non-sensitive data examples, legislative and regulatory compliance, United States example, privacy requirements compliance, and European Data Protection Directive. In End-User Training you will learn about security awareness training topics.

...
14 videos (Total 87 min), 14 readings, 1 quiz
14개의 동영상
Fundamental Concepts of Cryptography: Symmetric Cryptography5m
Fundamental Concepts of Cryptography: Key Distribution6m
Fundamental Concepts of Cryptography: Additional Algorithms5m
Fundamental Concepts of Cryptography: Asymmetric Cryptography7m
Fundamental Concepts of Cryptography: Using Public Key Cryptography7m
Fundamental Concepts of Cryptography: Attacking RSA7m
Fundamental Concepts of Cryptography: Message Digests5m
Fundamental Concepts of Cryptography: Chosen Plain-Text7m
Fundamental Concepts of Cryptography: Known Plaintext6m
Fundamental Concepts of Cryptography: Dictionary Attack4m
Fundamental Concepts of Cryptography: Factoring Attack5m
Understand Requirements For Cryptography: Data Sensitivity2m
Understand Requirements For Cryptography: Data Protection Directive7m
14개의 읽기 자료
Fundamental Concepts of Cryptography: Salting10m
Fundamental Concepts of Cryptography: Symmetric Cryptography10m
Fundamental Concepts of Cryptography: Key Distribution10m
Fundamental Concepts of Cryptography: Additional Algorithms10m
Fundamental Concepts of Cryptography: Asymmetric Cryptography10m
Fundamental Concepts of Cryptography: Using Public Key Cryptography10m
Fundamental Concepts of Cryptography: Attacking RSA10m
Fundamental Concepts of Cryptography: Message Digests10m
Fundamental Concepts of Cryptography: Chosen Plain-Text10m
Fundamental Concepts of Cryptography: Known Plaintext10m
Fundamental Concepts of Cryptography: Dictionary Attack10m
Fundamental Concepts of Cryptography: Factoring Attack10m
Understand Requirements For Cryptography: Data Sensitivity10m
Understand Requirements For Cryptography: Data Protection Directive10m
1개 연습문제
Quiz 214m
3
완료하는 데 3시간 필요

Operate and Implement Cryptographic System

Module Topics: Public Key Infrastructure (PKI), Fundamental Key Management concepts, Creation and Distribution of Keys, Web of Trust, Secure Protocols. In PKI you will learn about functions of CA, establishing trust, and X.509v3 certification issued by VeriSign. In Fundamental Key Management Concepts you will learn about standards for financial institutions, segregation of duties, and examples. In Creation and Distribution of Keys you will learn about truly random, random, generating a two-key encryption key set, key length, Asymmetric key length, key wrapping and key encryption keys, key distribution, key distribution centers, key storage and destruction, factors affecting risk exposure, cost of certificate replacement/revocation, key recovery, key escrow. In Secure Protocols you will learn about Authentication Header (AH), Encapsulating Security Payload (ESP), security associations, transport mode and tunnel mode, Internet Key Exchange (IKE), Secure/Multipurpose Internet Mail Extensions (S/MIME), S/MIME provides two security services, digital signatures, process for verifying a digital signature of an E-Mail message, message encryption, process for encryption of an E-Mail message, process for decrypting an E-Mail message, process of digitally signing and encrypting an E-mail message, process of decrypting an E-Mail message and verifying a digital signature, and triple-wrapped messages.

...
9 videos (Total 55 min), 9 readings, 1 quiz
9개의 동영상
Operate and Implement Cryptographic System: X.509 Certification8m
Operate and Implement Cryptographic System: PKI Activity4m
Operate and Implement Cryptographic System: Standards5m
Operate and Implement Cryptographic System: Truly Random7m
Operate and Implement Cryptographic System: Key Storage and Destruction3m
Operate and Implement Cryptographic System: Factors Affecting Risk6m
Operate and Implement Cryptographic System: Secure Protocols7m
Operate and Implement Cryptographic System: Digital Signatures7m
9개의 읽기 자료
Operate and Implement Cryptographic System: PKI10m
Operate and Implement Cryptographic System: X.509 Certification10m
Operate and Implement Cryptographic System: PKI Activity10m
Operate and Implement Cryptographic System: Standards10m
Operate and Implement Cryptographic System: Truly Random10m
Operate and Implement Cryptographic System: Key Storage and Destruction10m
Operate and Implement Cryptographic System: Factors Affecting Risk10m
Operate and Implement Cryptographic System: Secure Protocols10m
Operate and Implement Cryptographic System: Digital Signatures10m
1개 연습문제
Quiz 316m
4
완료하는 데 2시간 필요

Cryptography Case Study

This assignment is based on a case study that will require the student to put into practice the knowledge they have gained through the course. It requires the basic understanding of the topics and the ability to relate those topics to the real world. The objective of review is to determine whether the student has understood the concepts and has performed the necessary analysis to ensure a complete and thorough answer.

...
1 quiz
4.6
5개의 리뷰Chevron Right

암호화의 최상위 리뷰

대학: AJan 16th 2019

interns of telecommunication this is the best very nice one out

강사

Avatar

(ISC)² Education & Training

Education & Training

(ISC)² 정보

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

(ISC)² Systems Security Certified Practitioner (SSCP) 전문 분야 정보

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

자주 묻는 질문

  • 예. 등록하기 전에 첫 번째 비디오를 미리 보고 강의 계획을 검토할 수 있습니다. 미리 보기에 포함되지 않은 콘텐츠를 이용하려면 강좌를 구매해야 합니다.

  • 세션 시작일 전에 강좌에 등록하면 해당 강좌의 모든 강의 비디오 및 읽기 자료에 접근할 수 있습니다. 수업이 시작되면 과제를 제출할 수 있습니다.

  • 등록 후 세션이 시작되면 읽기 자료 항목 및 강좌 토론 포럼을 포함하여 모든 비디오와 기타 리소스를 이용할 수 있습니다. 연습 평가를 보고 제출하며 필요한 성적 평가 과제를 완료하여 성적을 받고 강좌 수료증을 취득할 수 있습니다.

  • 강좌를 성공적으로 수료하면 전자 강좌 수료증이 성취도 페이지에 추가됩니다. 해당 페이지에서 강좌 수료증을 인쇄하거나 LinkedIn 프로필에 수료증을 추가할 수 있습니다.

  • 이 강좌는 현재 Coursera에서 수업료를 결제했거나 재정 지원(해당하는 경우)을 받은 학습자만 이용할 수 있는 강좌입니다.

  • The course schedule contains approximately 14 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 6 weeks.

궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.