+1 (323) 555-9876
mail@rocket-soft.org
English flag
English
Select a Language
English flag
English
Arabic flag
Arabic
Spanish flag
Spanish
0
cryptography and network security

cryptography and network security

Master the fundamentals of user interface and user experience design. Learn design thinking, wireframing, prototyping, and user research techniques to create intuitive digital experiences that users love.
(1)
4 Students
83 Lectures
Kate Williams
Kate Williams

Instructor

What Will You Learn?

Have a greater understanding of your life's greater purpose
Replace limiting beliefs with empowering beliefs
See the greater meaning in the experiences in your life
Find greater meaning and purpose in your current career

About This Course

Simply put, drip content is the practice of releasing your content to your members in parts. In other words, you don't release all the content to your members immediately.

Homework, or a homework assignment, is a set of tasks assigned to students by their teachers to be completed outside the classroom. Common homework assignments may include required reading, a writing or typing project, mathematical exercises to be completed, information to be reviewed before a test, or other skills to be practiced.


The effects of homework are debated. Generally speaking, homework does not improve academic performance among young children. Homework may improve academic skills among older students, especially lower-achieving students. However, homework also creates stress for students and parents and reduces the amount of time that students can spend in other activities.

Requirements

Prepare to learn real life skills and build real web apps that will get you hired!
All tools and software used in this course will be free
No previous coding experience is needed
A computer (Windows/Mac/Linux). That's it!
Requirements

Trusted Companies

+3200 Companies trusted our courses for their staff tutoring

Company Logos
Company Logos
Company Logos
Company Logos

FAQ

Check the frequently asked questions about this course.

What is the course level?
This is a course for beginners so you will get familiar with the topic from scratch.
How can I get course updates?
You will receive a notification after each update is released so you can download updated files from the course page.
Is it a supported course?
Yes, you can get in touch with the instructor using the support system.
Kate Williams
Kate Williams
(3)
5 Courses
4 Students
"Short courses for busy managers" Hi there, my name is Kate Williams and I've been managing projects and virtual teams for the past 10+ years. I'm currently a Director at Cisco Systems,* where I lead Project and Program Management teams on delivering complex projects for Cisco's customers. Previously, I was a manager at Ernst & Young, where I analyzed failing projects at Fortune 500 companies, and recommended solutions to fix them. I was also a research assistant at Harvard University, where I studied issues related to virtual teams. I'm an Amazon bestselling author of 4 books about team management (including "Influencing Virtual Teams," "Don't Reply All," "Project Kickoff," and "Effective ...

Recent Reviews

See what students are saying about the course.

More Reviews
Jessica B. Gray
Jessica B. Gray 22 Jun 2022
Perfect course. I recommend this course to everyone. Regards.
Curriculum Overview

This course includes 1 modules, 83 lessons, and 0 hours of materials.

Cyptography and network security
83 Parts
Introduction to Cryptography and Network Security
Free
Volume -
CIA Triad
Free
Volume -
The OSI Security Architecture
Free
Volume -
Security Attacks
Free
Volume -
Security Services
Free
Volume -
Security Mechanisms
Free
Volume -
Network Security Model
Free
Volume -
Cryptography
Free
Volume -
Cryptography – Key Terms
Free
Volume -
Cryptanalysis
Free
Volume -
Brute Force Attack
Free
Volume -
Classical Encryption Techniques
Free
Volume -
Caesar Cipher (Part 1)
Free
Volume -
Caesar Cipher (Part 2)
Free
Volume -
Monoalphabetic Cipher
Free
Volume -
Playfair Cipher (Part 1)
Free
Volume -
Playfair Cipher (Part 2)
Free
Volume -
Playfair Cipher (Solved Question)
Free
Volume -
Hill Cipher (Encryption)
Free
Volume -
Hill Cipher (Decryption)
Free
Volume -
Polyalphabetic Cipher (Vigenère Cipher)
Free
Volume -
Polyalphabetic Cipher (Vernam Cipher)
Free
Volume -
Polyalphabetic Cipher (Vernam Cipher)
Free
Volume -
One Time Pad
Free
Volume -
Rail Fence Technique
Free
Volume -
Row Column Transposition Ciphering Technique
Free
Volume -
Steganography
Free
Volume -
LSB Steganography - Demo
Free
Volume -
Cryptography (Solved Questions)
Free
Volume -
Abstract Algebra and Number Theory
Free
Volume -
Prime Numbers in Cryptography
Free
Volume -
Modular Arithmetic (Part 1)
Free
Volume -
Modular Arithmetic (Part 2)
Free
Volume -
Modular Exponentiation (Part 1)
Free
Volume -
Modular Exponentiation (Part 2)
Free
Volume -
GCD - Euclidean Algorithm (Method 1)
Free
Volume -
GCD - Euclidean Algorithm (Method 2)
Free
Volume -
Relatively Prime (Co-Prime) Numbers
Free
Volume -
Euler’s Totient Function (Phi Function)
Free
Volume -
Euler’s Totient Function (Solved Examples)
Free
Volume -
Fermat's Little Theorem
Free
Volume -
Euler's Theorem
Free
Volume -
Primitive Roots
Free
Volume -
Extended Euclidean Algorithm (Solved Example 1)
Free
Volume -
Extended Euclidean Algorithm (Solved Example 2)
Free
Volume -
Extended Euclidean Algorithm (Solved Example 3)
Free
Volume -
The Chinese Remainder Theorem (Solved Example 1)
Free
Volume -
The Chinese Remainder Theorem (Solved Example 2)
Free
Volume -
The Discrete Logarithm Problem
Free
Volume -
The Discrete Logarithm Problem (Solved Example)
Free
Volume -
Prime Factorization (Fermat's Factoring Method)
Free
Volume -
Testing for Primality (Fermat's Test)
Free
Volume -
Testing for Primality (Miller-Rabin Test)
Free
Volume -
Group and Abelian Group
Free
Volume -
Cyclic Group
Free
Volume -
Rings, Fields and Finite Fields
Free
Volume -
Stream Cipher vs. Block Cipher
Free
Volume -
Feistel Cipher Structure
Free
Volume -
Introduction to Data Encryption Standard (DES)
Free
Volume -
Single Round of DES Algorithm
Free
Volume -
The F Function of DES (Mangler Function)
Free
Volume -
Key Scheduling and Decryption in DES
Free
Volume -
Avalanche Effect and the Strength of DES
Free
Volume -
Data Encryption Standard (DES) - Solved Questions
Free
Volume -
Introduction to Advanced Encryption Standard (AES)
Free
Volume -
AES Encryption and Decryption
Free
Volume -
AES Round Transformation
Free
Volume -
AES Key Expansion
Free
Volume -
AES Security and Implementation Aspects
Free
Volume -
Multiple Encryption and Triple DES
Free
Volume -
Block Cipher Modes of Operation
Free
Volume -
Electronic Codebook (ECB)
Free
Volume -
Cipher Block Chaining (CBC)
Free
Volume -
Cipher Feedback (CFB)
Free
Volume -
Output Feedback (OFB)
Free
Volume -
Counter Mode (CTR)
Free
Volume -
Block Cipher Modes of Operation (Solved Question)
Free
Volume -
Pseudorandom Number Generator (PRNG)
Free
Volume -
Golomb’s Randomness Postulates
Free
Volume -
Public Key Cryptography | Chapter-4 | Cryptography & Network Security |
Free
Volume -
Hash Functions & Digital Signatures | Chapter-5 | Cryptography & Network Security
Free
Volume -
System Practices & System Security | Chapter-6 | Cryptography & Network Security
Free
Volume -
Web, Email, & IP Security | Chapter-7 | Cryptography & Network Security
Free
Volume -
Certificates
1 Parts
Course Certificate
Course Certificate
If you pass all the lessons in this course, you will receive this certificate.
Type Course Certificate
Reply to Comment
Comments Approval

Your comment will be visible after admin approval.

4.00
1 Reviews
Content Quality (4)
Instructor Skills (4)
Value for Money (4)
Support Quality (4)
Jessica B. Gray
Jessica B. Gray
22 Jun 2022 01:26
Perfect course. I recommend this course to everyone. Regards.
Reply to Review
Submit Reply

Your reply to this review will be visible to all users.

cryptography and network security
Free

This Course Includes

Downloadable Content
Official Certificate
Instructor Support
Course Forum

Course Specifications

Sections
1
Lessons
83
Capacity
Unlimited
Duration
1:30 Hours
Students
4
Access Duration
365 Days
Created Date
21 Jun 2022
Updated Date
29 Nov 2025
Kate Williams
Kate Williams

Computer Engineer at Oracle

(3)
Faithful User
Expert Vendor
Golden Classes
Top Seller
Amazing Support
Invited
Robert Ransdell
Robert Ransdell

System Administrator at Amazon

(5)
Faithful User
Expert Vendor
Golden Classes
King Seller
Fantastic Support
Forums Top User
cryptography and network security
You are viewing
cryptography and network security