Duration: 1.5 hours
There is no such thing as a 100% secure cyber system. There are always bugs, risks of attacks, data theft, data tampering, and more. Cyber security experts are well aware of this; this is why system architects employ a strategy called defence in depth. In this course, you will learn about the concept of cryptography and the importance of encrypting and decrypting data, and about components of cryptographic protocols and the common standards used in encryption and decryption.
Please note: Course notes are provided in PDF format for your convenience and can be downloaded to print or view on your device.