About this Specialization

3,369 recent views
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.
Shareable Certificate
Earn a Certificate upon completion
100% online courses
Start instantly and learn at your own schedule.
Flexible Schedule
Set and maintain flexible deadlines.
Intermediate Level
Approximately 5 months to complete
Suggested pace of 2 hours/week
English
Shareable Certificate
Earn a Certificate upon completion
100% online courses
Start instantly and learn at your own schedule.
Flexible Schedule
Set and maintain flexible deadlines.
Intermediate Level
Approximately 5 months to complete
Suggested pace of 2 hours/week
English

How the Specialization Works

Take Courses

A Coursera Specialization is a series of courses that helps you master a skill. To begin, enroll in the Specialization directly, or review its courses and choose the one you'd like to start with. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. It’s okay to complete just one course — you can pause your learning or end your subscription at any time. Visit your learner dashboard to track your course enrollments and your progress.

Hands-on Project

Every Specialization includes a hands-on project. You'll need to successfully finish the project(s) to complete the Specialization and earn your certificate. If the Specialization includes a separate course for the hands-on project, you'll need to finish each of the other courses before you can start it.

Earn a Certificate

When you finish every course and complete the hands-on project, you'll earn a Certificate that you can share with prospective employers and your professional network.

There are 4 Courses in this Specialization

Course1

Course 1

Cryptography and Information Theory

4.5
stars
319 ratings
55 reviews
Course2

Course 2

Symmetric Cryptography

4.6
stars
202 ratings
38 reviews
Course3

Course 3

Asymmetric Cryptography and Key Management

4.7
stars
203 ratings
27 reviews
Course4

Course 4

Cryptographic Hash and Integrity Protection

4.5
stars
58 ratings
6 reviews

Offered by

Placeholder

University of Colorado System

Frequently Asked Questions

More questions? Visit the Learner Help Center.