À propos de ce cours
6,605 consultations récentes

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.

Niveau débutant

Approx. 13 heures pour terminer

Recommandé : 4 hours/week...

Anglais

Sous-titres : Anglais
Les étudiants prenant part à ce Course sont
  • Security Engineers
  • Technical Support Associates
  • Consultants
  • Engineers
  • Software Engineers

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.

Niveau débutant

Approx. 13 heures pour terminer

Recommandé : 4 hours/week...

Anglais

Sous-titres : Anglais

Programme du cours : ce que vous apprendrez dans ce cours

Semaine
1
4 heures pour terminer

Understand and Apply Fundamental Concepts of Cryptography

16 vidéos (Total 90 min), 15 lectures, 1 quiz
16 vidéos
Fundamental Concepts of Cryptography: Key Concepts and Definitions6 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions6 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions3 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions5 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions3 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions6 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions4 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions8 min
Fundamental Concepts of Cryptography: High Work Factor5 min
Fundamental Concepts of Cryptography: Block Ciphers4 min
Fundamental Concepts of Cryptography: Basic Block Cipher Modes5 min
Fundamental Concepts of Cryptography: Evaluation of Algorithms7 min
Fundamental Concepts of Cryptography: Algorithm Characteristics6 min
Fundamental Concepts of Cryptography: Attacks7 min
Fundamental Concepts of Cryptography: The Birthday Paradox4 min
15 lectures
Fundamental Concepts of Cryptography: Key Concepts and Definitions10 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10 min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10 min
Fundamental Concepts of Cryptography: High Work Factor10 min
Fundamental Concepts of Cryptography: Block Ciphers10 min
Fundamental Concepts of Cryptography: Basic Block Cipher Modes10 min
Fundamental Concepts of Cryptography: Evaluation of Algorithms10 min
Fundamental Concepts of Cryptography: Algorithm Characteristics10 min
Fundamental Concepts of Cryptography: Attacks10 min
Fundamental Concepts of Cryptography: The Birthday Paradox10 min
1 exercice pour s'entraîner
Quiz 120 min
Semaine
2
4 heures pour terminer

Understand Requirements for Cryptography

14 vidéos (Total 87 min), 14 lectures, 1 quiz
14 vidéos
Fundamental Concepts of Cryptography: Symmetric Cryptography5 min
Fundamental Concepts of Cryptography: Key Distribution6 min
Fundamental Concepts of Cryptography: Additional Algorithms5 min
Fundamental Concepts of Cryptography: Asymmetric Cryptography7 min
Fundamental Concepts of Cryptography: Using Public Key Cryptography7 min
Fundamental Concepts of Cryptography: Attacking RSA7 min
Fundamental Concepts of Cryptography: Message Digests5 min
Fundamental Concepts of Cryptography: Chosen Plain-Text7 min
Fundamental Concepts of Cryptography: Known Plaintext6 min
Fundamental Concepts of Cryptography: Dictionary Attack4 min
Fundamental Concepts of Cryptography: Factoring Attack5 min
Understand Requirements For Cryptography: Data Sensitivity2 min
Understand Requirements For Cryptography: Data Protection Directive7 min
14 lectures
Fundamental Concepts of Cryptography: Salting10 min
Fundamental Concepts of Cryptography: Symmetric Cryptography10 min
Fundamental Concepts of Cryptography: Key Distribution10 min
Fundamental Concepts of Cryptography: Additional Algorithms10 min
Fundamental Concepts of Cryptography: Asymmetric Cryptography10 min
Fundamental Concepts of Cryptography: Using Public Key Cryptography10 min
Fundamental Concepts of Cryptography: Attacking RSA10 min
Fundamental Concepts of Cryptography: Message Digests10 min
Fundamental Concepts of Cryptography: Chosen Plain-Text10 min
Fundamental Concepts of Cryptography: Known Plaintext10 min
Fundamental Concepts of Cryptography: Dictionary Attack10 min
Fundamental Concepts of Cryptography: Factoring Attack10 min
Understand Requirements For Cryptography: Data Sensitivity10 min
Understand Requirements For Cryptography: Data Protection Directive10 min
1 exercice pour s'entraîner
Quiz 214 min
Semaine
3
3 heures pour terminer

Operate and Implement Cryptographic System

9 vidéos (Total 55 min), 9 lectures, 1 quiz
9 vidéos
Operate and Implement Cryptographic System: X.509 Certification8 min
Operate and Implement Cryptographic System: PKI Activity4 min
Operate and Implement Cryptographic System: Standards5 min
Operate and Implement Cryptographic System: Truly Random7 min
Operate and Implement Cryptographic System: Key Storage and Destruction3 min
Operate and Implement Cryptographic System: Factors Affecting Risk6 min
Operate and Implement Cryptographic System: Secure Protocols7 min
Operate and Implement Cryptographic System: Digital Signatures7 min
9 lectures
Operate and Implement Cryptographic System: PKI10 min
Operate and Implement Cryptographic System: X.509 Certification10 min
Operate and Implement Cryptographic System: PKI Activity10 min
Operate and Implement Cryptographic System: Standards10 min
Operate and Implement Cryptographic System: Truly Random10 min
Operate and Implement Cryptographic System: Key Storage and Destruction10 min
Operate and Implement Cryptographic System: Factors Affecting Risk10 min
Operate and Implement Cryptographic System: Secure Protocols10 min
Operate and Implement Cryptographic System: Digital Signatures10 min
1 exercice pour s'entraîner
Quiz 316 min
Semaine
4
2 heures pour terminer

Cryptography Case Study

1 quiz
4.6
9 avisChevron Right

Principaux examens pour Cryptographie

par MKNov 6th 2019

One of the most important security topics for CIA, Authentication & Non-repudiation. Absolutely must have knowledge as a security stakeholder. Practical skills throughout the course. Thanks.

par AJan 16th 2019

interns of telecommunication this is the best very nice one out

Enseignant

Avatar

(ISC)² Education & Training

Education & Training

À propos de (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

À propos du (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Foire Aux Questions

  • Oui, vous pouvez prévisualiser la première vidéo et consulter le programme du cours avant de vous inscrire. Vous devez acheter le cours pour accéder au contenu non inclus dans la prévisualisation.

  • Si vous décidez de vous inscrire au cours avant la date de début de session, vous aurez accès à toutes les vidéos et lectures du cours. Vous pourrez soumettre des devoirs à partir du début de la session.

  • Une fois que vous êtes inscrit(e) et que votre session commence, vous avez accès à toutes les vidéos et aux autres ressources, y compris les éléments à lire et le forum de discussion du cours. Vous pouvez afficher et soumettre des devoirs pour vous exercer, et terminer les devoirs notés requis pour obtenir une note et un Certificat de Cours.

  • Si vous réussissez le cours, votre Certificat de Cours électronique sera ajouté à votre page Accomplissements. À partir de cette page, vous pouvez imprimer votre Certificat de Cours ou l'ajouter à votre profil LinkedIn.

  • Ce cours fait partie du nombre restreint de cours proposés par Coursera actuellement disponibles uniquement aux étudiants ayant payé les frais du cours ou bénéficié de l'Aide Financière, lorsqu'elle est disponible.

  • The course schedule contains approximately 14 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 6 weeks.

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.