Informações sobre o curso
6,709 visualizações recentes

100% on-line

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 12 horas para completar

Sugerido: 4 hours/week...

Inglês

Legendas: Inglês

100% on-line

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 12 horas para completar

Sugerido: 4 hours/week...

Inglês

Legendas: Inglês

Programa - O que você aprenderá com este curso

Semana
1
4 horas para concluir

Understand and Apply Fundamental Concepts of Cryptography

16 vídeos (Total 90 mín.), 15 leituras, 1 teste
16 videos
Fundamental Concepts of Cryptography: Key Concepts and Definitions6min
Fundamental Concepts of Cryptography: Key Concepts and Definitions6min
Fundamental Concepts of Cryptography: Key Concepts and Definitions3min
Fundamental Concepts of Cryptography: Key Concepts and Definitions5min
Fundamental Concepts of Cryptography: Key Concepts and Definitions3min
Fundamental Concepts of Cryptography: Key Concepts and Definitions6min
Fundamental Concepts of Cryptography: Key Concepts and Definitions4min
Fundamental Concepts of Cryptography: Key Concepts and Definitions8min
Fundamental Concepts of Cryptography: High Work Factor5min
Fundamental Concepts of Cryptography: Block Ciphers4min
Fundamental Concepts of Cryptography: Basic Block Cipher Modes5min
Fundamental Concepts of Cryptography: Evaluation of Algorithms7min
Fundamental Concepts of Cryptography: Algorithm Characteristics6min
Fundamental Concepts of Cryptography: Attacks7min
Fundamental Concepts of Cryptography: The Birthday Paradox4min
15 leituras
Fundamental Concepts of Cryptography: Key Concepts and Definitions10min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10min
Fundamental Concepts of Cryptography: Key Concepts and Definitions10min
Fundamental Concepts of Cryptography: High Work Factor10min
Fundamental Concepts of Cryptography: Block Ciphers10min
Fundamental Concepts of Cryptography: Basic Block Cipher Modes10min
Fundamental Concepts of Cryptography: Evaluation of Algorithms10min
Fundamental Concepts of Cryptography: Algorithm Characteristics10min
Fundamental Concepts of Cryptography: Attacks10min
Fundamental Concepts of Cryptography: The Birthday Paradox10min
1 exercício prático
Quiz 120min
Semana
2
4 horas para concluir

Understand Requirements for Cryptography

14 vídeos (Total 87 mín.), 14 leituras, 1 teste
14 videos
Fundamental Concepts of Cryptography: Symmetric Cryptography5min
Fundamental Concepts of Cryptography: Key Distribution6min
Fundamental Concepts of Cryptography: Additional Algorithms5min
Fundamental Concepts of Cryptography: Asymmetric Cryptography7min
Fundamental Concepts of Cryptography: Using Public Key Cryptography7min
Fundamental Concepts of Cryptography: Attacking RSA7min
Fundamental Concepts of Cryptography: Message Digests5min
Fundamental Concepts of Cryptography: Chosen Plain-Text7min
Fundamental Concepts of Cryptography: Known Plaintext6min
Fundamental Concepts of Cryptography: Dictionary Attack4min
Fundamental Concepts of Cryptography: Factoring Attack5min
Understand Requirements For Cryptography: Data Sensitivity2min
Understand Requirements For Cryptography: Data Protection Directive7min
14 leituras
Fundamental Concepts of Cryptography: Salting10min
Fundamental Concepts of Cryptography: Symmetric Cryptography10min
Fundamental Concepts of Cryptography: Key Distribution10min
Fundamental Concepts of Cryptography: Additional Algorithms10min
Fundamental Concepts of Cryptography: Asymmetric Cryptography10min
Fundamental Concepts of Cryptography: Using Public Key Cryptography10min
Fundamental Concepts of Cryptography: Attacking RSA10min
Fundamental Concepts of Cryptography: Message Digests10min
Fundamental Concepts of Cryptography: Chosen Plain-Text10min
Fundamental Concepts of Cryptography: Known Plaintext10min
Fundamental Concepts of Cryptography: Dictionary Attack10min
Fundamental Concepts of Cryptography: Factoring Attack10min
Understand Requirements For Cryptography: Data Sensitivity10min
Understand Requirements For Cryptography: Data Protection Directive10min
1 exercício prático
Quiz 214min
Semana
3
3 horas para concluir

Operate and Implement Cryptographic System

9 vídeos (Total 55 mín.), 9 leituras, 1 teste
9 videos
Operate and Implement Cryptographic System: X.509 Certification8min
Operate and Implement Cryptographic System: PKI Activity4min
Operate and Implement Cryptographic System: Standards5min
Operate and Implement Cryptographic System: Truly Random7min
Operate and Implement Cryptographic System: Key Storage and Destruction3min
Operate and Implement Cryptographic System: Factors Affecting Risk6min
Operate and Implement Cryptographic System: Secure Protocols7min
Operate and Implement Cryptographic System: Digital Signatures7min
9 leituras
Operate and Implement Cryptographic System: PKI10min
Operate and Implement Cryptographic System: X.509 Certification10min
Operate and Implement Cryptographic System: PKI Activity10min
Operate and Implement Cryptographic System: Standards10min
Operate and Implement Cryptographic System: Truly Random10min
Operate and Implement Cryptographic System: Key Storage and Destruction10min
Operate and Implement Cryptographic System: Factors Affecting Risk10min
Operate and Implement Cryptographic System: Secure Protocols10min
Operate and Implement Cryptographic System: Digital Signatures10min
1 exercício prático
Quiz 316min
Semana
4
2 horas para concluir

Cryptography Case Study

1 teste
4.6
9 avaliaçõesChevron Right

Principais avaliações do Criptografia

por MKNov 6th 2019

One of the most important security topics for CIA, Authentication & Non-repudiation. Absolutely must have knowledge as a security stakeholder. Practical skills throughout the course. Thanks.

por AJan 16th 2019

interns of telecommunication this is the best very nice one out

Instrutores

Avatar

(ISC)² Education & Training

Education & Training

Sobre (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

Sobre (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Perguntas Frequentes – FAQ

  • Sim, você pode assistir uma prévia do primeiro vídeo e ver programa do curso antes de se inscrever. Você precisa comprar o curso para ter acesso ao conteúdo não incluído na prévia.

  • Se decidir se inscrever no curso antes da data de início da sessão, terá acesso a todos os vídeos das palestras e leituras do curso. Também poderá enviar tarefas assim que a sessão começar.

  • Uma vez inscrito, e tão logo sua sessão tenha iniciado, você terá acesso a todos os vídeos e outros recursos, incluindo itens de leitura e fórum de discussão do curso. Você poderá ver e enviar tarefas práticas e concluir tarefas com nota atribuída obrigatórias para obter uma nota e um Certificado de Curso.

  • Se você concluir o curso com êxito, seu Certificado de Curso eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn.

  • Este curso é um dos poucos oferecidos pela Coursera que está disponível apenas para alunos que tenham pago ou recebido auxílio financeiro, quando disponível.

  • The course schedule contains approximately 14 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 6 weeks.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.