Loading…

READY TO ROCK?

Click the button below to start exploring our website and learn more about our awesome company
Start exploring

Cryptography

This course addresses the use of various cryptographic techniques for securing data from unauthorized access. The algorithms used for symmetric ciphers, asymmetric ciphers and cryptographic data integrity are discussed. The students learn the practical use of algorithms for the encryption of data including a public key infrastructure for issuing certificates; transport level security implementation for security both web and remote access; and virtual private networks implementation for securing data in transit across unsecured networks.