This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.
What is the refund policy?
Can I just enroll in a single course?
Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.
Is financial aid available?
Can I take the course for free?
Is this course really 100% online? Do I need to attend any classes in person?
This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.
Will I earn university credit for completing the Specialization?
This Specialization doesn't carry university credit, but some universities may choose to accept Specialization Certificates for credit. Check with your institution to learn more.
How long does it take to complete the Specialization?
The specialization is designed to span across 4 courses and 16-17 weeks with the load being 2-5 hours per week.
What background knowledge is necessary?
The learners are recommended to have background in engineering and have a working knowledge of discrete mathematics and probability.
Do I need to take the courses in a specific order?
It is recommended to follow the order of the courses as specified in this specialization.
What will I be able to do upon completing the Specialization?
By the end of this specialization, the learners will be able to apply cryptography to secure networking and systems, design cryptographic protocols and cryptosystems using established primitives, and evaluate the security strength and identify the potential vulnerabilities of existing systems.