CYBR463 — Applied Cryptography
Modern cryptography including symmetric and asymmetric cryptosystems, secure hash functions, digital signatures, and PKI.
Learning Objectives & Matches
Implement cryptographic algorithms including AES, RSA, and elliptic curve cryptography
Design and verify cryptographic protocols to protect private information.
Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
Design and implement Web site security measures, such as firewalls and message encryption.
Develop or implement data analysis algorithms.
Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
Identify or implement solutions to information security problems.
Implement Web site security measures, such as firewalls or message encryption.
Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
Provide customers or installation teams guidelines for implementing secure systems.
Apply public key infrastructure (PKI) and certificate management for secure communications
Design and verify cryptographic protocols to protect private information.
Design and implement Web site security measures, such as firewalls and message encryption.
Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
Implement Web site security measures, such as firewalls or message encryption.
Develop information security standards and best practices.
Identify or implement solutions to information security problems.
Provide customers or installation teams guidelines for implementing secure systems.
Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
Use secure hash functions including SHA-256 for data integrity verification
Design and verify cryptographic protocols to protect private information.
Provide customers or installation teams guidelines for implementing secure systems.
Assess blockchain threats, such as untested code and unprotected keys.
Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
Plan, coordinate, and implement network security measures to protect data, software, and hardware.
Implement Web site security measures, such as firewalls or message encryption.
Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
Design and implement Web site security measures, such as firewalls and message encryption.
Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Design and implement cryptographic protocols for authentication and key exchange
Design and verify cryptographic protocols to protect private information.
Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
Design and implement Web site security measures, such as firewalls and message encryption.
Design and develop blockchain technologies for industries such as finance and music.
Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Design security solutions to address known device vulnerabilities.
Identify, standardize, and communicate levels of access and security.
Provide customers or installation teams guidelines for implementing secure systems.
Design computers and the software that runs them.
Implement digital signatures for message authentication and non-repudiation