Course description

Confidentiality integrity availability authentication authorization and accountability are the most critical security requirements that serve as the basis for deploying and delivering trustworthy information technology applications and services in enterprises mobile devices and via cloud providers. Adopting cryptography and identity management techniques addresses these security requirements and has become a vital part of all business applications and electronic transactions. This course provides ground-up coverage on the high-level concepts applied mechanisms architecture and real-world implementation practices of cryptography and identity management techniques as they apply to blockchain and cloud-hosted applications and services.

Instructors

You may also like