Information Flow Models and Hook-Up Theorem - Part 2

Loading...
Просмотреть программу курса

Получаемые навыки

Cybersecurity, Cryptography, Public-Key Cryptography

Рецензии

4.8 (оценок: 314)
  • 5 stars
    254 ratings
  • 4 stars
    51 ratings
  • 3 stars
    5 ratings
  • 2 stars
    2 ratings
  • 1 star
    2 ratings
ES

Dec 31, 2019

The course is called Cyber Attacks Countermeasures, but really only focuses on Authentication and Encryption. Great class on those topics for someone new to cyber security!

TK

Mar 08, 2018

This is an excellent course with enough historical context for those who are not familiar with cybersecurity and good videos and current developments in the field.

Преподаватели

  • Dr. Edward G. Amoroso

    Dr. Edward G. Amoroso

    Research Professor, NYU and CEO, TAG Cyber LLC

Ознакомьтесь с нашим каталогом

Присоединяйтесь бесплатно и получайте персонализированные рекомендации, обновления и предложения.