Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
About this Course
Written by fellow Instructor, this course gives you an exposure about security mechanism where messages can be transformed (the cipher text) without exposing the information it represents. You also will learn to appreciate the significance of cryptography as a mean of securing information in the modern world. Contact our Instructor with any learning questions.
Course Synopsis
This course provides the background for the application and implementation of security mechanisms covered in the other courses. It deals with both theoretical and practical aspects of cryptography, to give an insight to the problems that arise in cryptography and the tools used to solve them. It introduces both symmetric key cipher systems and public key cryptography, covering methods of obtaining the objectives of CIA (confidentiality, integrity and availability).
Transferable Skills
How it Works
Through videos and easy-to-understand text lessons, this course will provide you with best learning experience and cover specific topics as you work on through your own learning. Each lesson and its corresponding activities can also be accessed on any mobile device, at any time.
This course includes:
How to Pass
You have to complete all the learning activities and assignments, and sit for the online final examination. Assessments will be given to evaluate whether you have achieved the Course Learning Outcomes. You are able to download with a Certificate of Completion upon finishing all the learning materials. Certificate of Achievement is also available to be download upon passing all the assessments. The examination will be conducted at a scheduled time and date.
Credit Earn
Earning and transferring credit to the Bachelor of ICT under School of Science and Technology at AeU.
*Applicants must fulfill the standard entry requirements and course credit transfer eligibility criteria for each programmes.
1 - Identify the method of attacks in real world situations and propose the solution based on cryptography knowledge in the field of ICT management. |
2 - Formulate appropriate approach or method based on cryptographic theories, principles and modern techniques in solving real world security problems. |
3 - Produce high technology, classical security practice and common sense ideas and solutions in solving real world security problems for the benefit of organizations and society. |
Completion of:
Completion of: