About this Specialization

5,226 recent views
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.
Shareable Certificate
Earn a Certificate upon completion
100% online courses
Start instantly and learn at your own schedule.
Flexible Schedule
Set and maintain flexible deadlines.
Intermediate Level
Approx. 5 months to complete
Suggested 2 hours/week
English
Shareable Certificate
Earn a Certificate upon completion
100% online courses
Start instantly and learn at your own schedule.
Flexible Schedule
Set and maintain flexible deadlines.
Intermediate Level
Approx. 5 months to complete
Suggested 2 hours/week
English

There are 4 Courses in this Specialization

Course1

Course 1

Cryptography and Information Theory

4.4
stars
249 ratings
42 reviews
Course2

Course 2

Symmetric Cryptography

4.5
stars
158 ratings
30 reviews
Course3

Course 3

Asymmetric Cryptography and Key Management

4.6
stars
160 ratings
18 reviews
Course4

Course 4

Cryptographic Hash and Integrity Protection

4.5
stars
48 ratings
5 reviews

Offered by

Placeholder

University of Colorado System

Frequently Asked Questions

More questions? Visit the Learner Help Center.