About this Specialization

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.
Shareable Certificate
Earn a Certificate upon completion
100% online courses
Start instantly and learn at your own schedule.
Flexible Schedule
Set and maintain flexible deadlines.
Intermediate Level
Approximately 5 months to complete
Suggested pace of 2 hours/week
English
Shareable Certificate
Earn a Certificate upon completion
100% online courses
Start instantly and learn at your own schedule.
Flexible Schedule
Set and maintain flexible deadlines.
Intermediate Level
Approximately 5 months to complete
Suggested pace of 2 hours/week
English

There are 4 Courses in this Specialization

Course1

Course 1

Cryptography and Information Theory

4.5
stars
303 ratings
52 reviews
Course2

Course 2

Symmetric Cryptography

4.6
stars
196 ratings
37 reviews
Course3

Course 3

Asymmetric Cryptography and Key Management

4.7
stars
191 ratings
23 reviews
Course4

Course 4

Cryptographic Hash and Integrity Protection

4.4
stars
53 ratings
5 reviews

Offered by

Placeholder

University of Colorado System

Frequently Asked Questions

More questions? Visit the Learner Help Center.