Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
· Provide a 500 word (or 2 pages double spaced) minimum reflection.
· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
· Share a personal connection that identifies specific knowledge and theories from this course.
· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
COURSE NAME: Cryptography
Topics:
Computer and Network Security Concepts
Classical Encryption Techniques.
Block Ciphers and Data Encryption
Introduction to Number Theory
Finite Fields and Advanced Encryption Standard
Random Bit Generation and Stream Ciphers
Public Key Cryptography and R S A and Other Public-Key Cryptosystems
IP Security
Cryptographic Hash Functions
Message Authentication Codes
Digital Signatures
Lightweight Cryptography and Post-Quantum Cryptography
Cryptographic Key Management and Distribution
User Authentication
Transport-Level Security
Wireless Network Security
Electronic Mail Security
Cloud Security
Network Endpoint Security


0 comments