Skip to main content
Print this page
Select a Catalog
Walsh College Academic Catalog 2024-2025
Walsh College Transfer Resources
Walsh College Academic Catalog 2023-2024
Archive Catalogs
Catalog Search
Search Options
Entire Catalog
Programs
Courses
Search
http://walshcollege.smartcatalogiq.com/
7d27710f-4f3f-4659-a21e-d118f12c27f3
https://searchproxy.smartcatalogiq.com/search
80e0075d-3b14-4005-8ebf-cf1b9297a8f8
course
/Institutions/Walsh-College/json/2020-2021/Walsh-College-Catalog-local.json
/Institutions/Walsh-College/json/2020-2021/Walsh-College-Catalog.json
Contents
Welcome to Walsh
Academic Calendar & Important Dates
General Information
Walsh Degree Programs
Academic Policies and Requirements
Undergraduate Degree Programs
Applied Management, Bachelor of Science (BSAM)*
Information Technology, Bachelor of Science (BSIT)
Graduate Degree Programs
Dual Degree Programs
Graduate Certificates
Doctoral Degree Program
Courses
ACC - Accounting
BL - Business Law
COM - Communications
ECN - Economics
ENG - English
FIN - Finance
IDS - Interdisciplinary
IT - Information Technology
200
300
400
IT 402
IT 403
IT 405
IT 406
IT 407
IT 408
IT 410
IT 412
IT 413
IT 414
IT 415
IT 416
IT 417
IT 419
IT 422
IT 430
IT 431
IT 440
IT 450
IT 451
IT 452
IT 453
IT 460
IT 461
IT 462
IT 463
IT 483
IT 490
IT 499
500
MGT - Management
MKT - Marketing
MTH - Math
QM - Quantitative Methods
TAX - Taxation
Walsh Leadership
Walsh Faculty
Walsh Board of Trustees
Walsh History
Notice of Nondiscrimination
Catalog Links
Catalog Home
Site Map
All Catalogs
IT 463
CRYPTOGRAPHY
Modern cryptographic algorithms and techniques underpin many of the tools, programs, and devices used to provide security in today's organizations. In this course, students will get an in-depth look at the building blocks of cryptographic algorithms, utilize modern ciphers through practical exercises, discuss current issues around cryptography, and gain a deep understanding of how cryptography is used to ensure the confidentiality, integrity, availability, and non-repudiation of organizational information. Symmetric, asymmetric, and un-keyed algorithms will be explored, as well as practical attacks and defenses applicable to cryptographic keys.
Credits
3
Prerequisite
IT 417
Distribution
INFORMATION TECHNOLOGY