The security of your computer system is important to protect your files and data stored in your system. Knowing how the network and computer security works should be a primary objective of computer specialist to protect both individuals and organizations.
This [course_title] contains different tools and methodologies that can be used to protect the computer system. You will understand how a network can be protected to avoid the risks of data theft or loss.
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer need to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: MIT
|Security Mechanisms and Principles||00:05:00|
|Encryption, Perfect Secrecy, One-Time Pad||00:10:00|
|Cryptographic Hash Functions||00:10:00|
|Hashing Applications and Constructions||00:10:00|
|Block Cipher Modes||00:15:00|
|Message Authentication Codes||00:15:00|
|Prime Finding and other Crypto Math||00:20:00|
|Diffie-Hellman Key Exchange and Crypto Groups||00:20:00|
|Pedersen Commitment, PK Encryption, DDH||00:20:00|
|Malleability of El Gamal, IND-CCA2||00:25:00|
|DSA, Gap Groups||00:10:00|
|Gap Groups, Bilinear Maps, and Applications||00:15:00|
|Submit Your Assignment||00:00:00|
No Reviews found for this course.