In our tech-driven world, the demand for cybersecurity professionals has never been greater. This course introduces cryptographic elements and obfuscation of information by solving complex puzzles and ciphers. See how encryption turns numbers, text, images, and sounds into a scrambled stream—and puts them all back together again. Then take a look into modern cybersecurity to see how these time-proven methods are still protecting information in the digital age.
After you've received your security clearance, learn how information can be hidden and stored in digital mediums like pictures, music, and videos. Dive into hashing and Linux, and discover the aspects of cryptography, security, and encryption needed to speak this new language and set out on a professional journey into this growing field.
Time | Price | |
---|---|---|
University of California Berkeley
In our tech-driven world, the demand for cybersecurity professionals has never been greater. This course introduces cryptographic elements and obfuscation of information by solving complex puzzles and ciphers. See how encryption turns numbers, text, images, and sounds into a scrambled stream—and puts them all back together again. Then take a look into modern cybersecurity to see how these time-proven methods are still protecting information in the digital age. After you've received your security clearance, learn how information can be hidden and stored in digital mediums like pictures, music, and videos. Dive into hashing and Linux, and discover the aspects of cryptography, security, and encryption needed to speak this new language and set out on a professional journey into this growing field. |
Mon-Fri, 12am - 11:59pm - |
$3,799 |