Cybersecurity and Secure Software Design
Introduction of basic principles and applications of cybersecurity. Topics include symmetric and asymmetric encryption and decryption algorithms, hashing techniques, digital certificates, digital signatures, message authentication codes, authentication, malware, and security of systems such as networks, operating systems, software, and databases.
Upon successfully completing this course, the student should be able to: describe symmetric and asymmetric cryptographic algorithms, demonstrate security application development skills, compare key distribution algorithms, compare authentication techniques, explain transport layer security, and demonstrate proficiency in the security of systems and applications such as email, networking, database, and operating systems.
Watch on Coursera ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Related AI Lessons
⚡
⚡
⚡
⚡
The Hidden Risk in Emergency Evacuation Plans Nobody Talks About
Medium · Cybersecurity
3 Key Takeaways on Why Cybersecurity Product Management Matters More Than Ever
Medium · Cybersecurity
The Coding Challenge That Came for Your development Directory: Anatomy of a Job Interview Infostealer
Dev.to · Alex Chen
I Watched an AI Hack a Home Network in Under 10 Minutes
Medium · Cybersecurity
🎓
Tutor Explanation
DeepCamp AI