Read our cookies policy and privacy statement for more information.
×Denver, Colorado•
A broad overview of computer security, roughly divided into three unequal components: a) the history of codes and ciphers; b) basic cryptographic techniques, for example, symmetric cryptography, authentication techniques, and asymmetric crypto systems, and: c) applications to current and future computer-related technologies, for example, network security, wireless communication, quantum cryptography, and more. Cross-listed with ISMG 7002.
Units: 3.0
Hours: 3 to 3