Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Udacity - Applied Cryptography

Posted By: serpmolot
Udacity - Applied Cryptography

Udacity - Applied Cryptography
English | mp4 | H264 852x480 | AAC 2 ch | Sub (.srt): English | 4.36 GB
eLearning | Level: Advanced

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

Why Take This Course?
Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.
Prerequisites and Requirements

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.

See the Technology Requirements for using Udacity.

What Will I Learn?
Syllabus
Lesson 1: Perfect Ciphers
What makes certain ciphers perfect, how the Lorenz Cipher was broken

Lesson 2: Symmetric Encryption
Sending messages when two people share a secret

Lesson 3: Key Exchange
Techniques to establish a shared secret

Lesson 4: Asymmetric Encryption
Exchanging information using public key cryptosystems

Lesson 5: Public Key Protocols
Encrypted key exchange, certificates, secure commerce

Lesson 6: Using Cryptographic Primitives
How cryptography can be useful for anonymizing communication, voting, and digital cash

Lesson 7: Secure Computation
Computing without exposing data

Screenshots:

Udacity - Applied Cryptography

Udacity - Applied Cryptography

Udacity - Applied Cryptography

NO MIRRORS PLEASE

WANT MORE? VISIT MY BLOG!


Udacity - Applied Cryptography