Course description

Confidentiality, integrity, availability, authentication, authorization, and accountability are the most critical security requirements that serve as the basis for deploying and delivering trustworthy information technology applications and services in enterprises, mobile devices, and via cloud providers. Adopting cryptography and identity management techniques addresses these security requirements and has become a vital part of all business applications and electronic transactions. This course provides ground-up coverage on the high-level concepts, applied mechanisms, architecture, and real-world implementation practices of cryptography and identity management techniques as they apply to blockchain and cloud-hosted applications and services.

Instructors

You may also like