5,231 recent views

#### 100% online

Start instantly and learn at your own schedule.

#### Approx. 8 hours to complete

Suggested: 2-4 hours/week...

#### English

Subtitles: English

#### 100% online

Start instantly and learn at your own schedule.

#### Approx. 8 hours to complete

Suggested: 2-4 hours/week...

#### English

Subtitles: English

# Learners taking this Course are

• Security Engineers
• Chief Technology Officers (CTOs)
• Machine Learning Engineers
• Data Scientists
• Technical Support Associates

### Syllabus - What you will learn from this course

Week
1
2 hours to complete

## Cryptography Overview

8 videos (Total 19 min), 1 reading, 2 quizzes
8 videos
Module Objectives1m
Alice, Bob, and Eve1m
Cryptography Terminology2m
Threat Model and the Attacker Knowledge1m
Kerckhoff's Principle3m
Security by Obscurity and Steganography, Part 12m
Security by Obscurity and Steganography, Part 21m
Slides for Cryptography Overview20m
1 practice exercise
Kerckhoff's Principle and Security by Obscurity30m
Week
2
2 hours to complete

## Information Entropy

6 videos (Total 44 min), 1 reading, 2 quizzes
6 videos
Deterministic vs. Random4m
Information Entropy5m
Entropy: Uniform Distribution Case9m
Entropy: General Distribution Case13m
Entropy Recap9m
Slides for Information Entropy20m
2 practice exercises
Throwing a Dice15m
Entropy: Balls in a Bin35m
Week
3
1 hour to complete

## Brute-Force Attack and Cryptanalysis

4 videos (Total 13 min), 1 reading, 1 quiz
4 videos
Brute Force Attack3m
Cryptanalysis5m
Lecture Slides for Brute Force and Cryptanalysis20m
1 practice exercise
Brute-Force Attack, Cryptanalysis, and One-Time Pad30m
Week
4
2 hours to complete

## Computational Security and Side-Channel Attack

3 videos (Total 12 min), 2 readings
3 videos
Computational Security: Attacker's Computational Bound6m
Side-Channel Attack4m
Lecture Slides for Computational Security and Side Channel Attacks20m
Reading on physical side-channel attacks1h 10m
4.4
15 Reviews

## 20%

got a tangible career benefit from this course

### Top reviews from Cryptography and Information Theory

By RSNov 14th 2018

The course mainly covers criteria for security. I need more of cryptography in it. Its not completely useful.

By SDJan 14th 2018

This is fabulous course that i found, great assignment and questions make this course course worth full.

## Instructor

### Sang-Yoon Chang

Assistant Professor
Computer Science

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

## About the Applied Cryptography Specialization

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols....