The Introduction to Cryptography course examines algorithms and cryptographic principles used to protect information. Students will learn the principles of hashing along with symmetric, asymmetric, private-key, and public-key encryption and the limitations of these algorithms. They will study the use of centralized and distributed digital trust models as well as the roles of trusted parties. By the end of the course, students will be able to apply appropriate trust models and encryption techniques for data both at rest and in transit to typical security implementations.
Please note: This course must be successfully completed within 2-attempts. Students unable to successfully complete the course within 2-attempts will be dismissed from the program.