Skip to main content
Print this page
Select a Catalog
Walsh College Academic Catalog 2024-2025
Walsh College Transfer Resources
Walsh College Academic Catalog 2023-2024
Archive Catalogs
Catalog Search
Search Options
Entire Catalog
Programs
Courses
Search
http://walshcollege.smartcatalogiq.com/
12b51007-a6b1-4247-813a-121c71f218ae
https://searchproxy.smartcatalogiq.com/search
c2896d2f-6e70-424c-afec-192101b1fb35
course
/Institutions/Walsh-College/json/2022-2023/Walsh-College-Catalog-2022-2023-local.json
/Institutions/Walsh-College/json/2022-2023/Walsh-College-Catalog-2022-2023.json
Contents
Welcome to Walsh College
Academic Calendar & Important Dates
General Information
Academic Policies and Requirements
Walsh College Degree Programs
Undergraduate Degree Programs
Graduate Degree Programs
Dual Degree Programs
Graduate Certificates
Doctoral Degree Programs
Courses
ACC - Accounting
BL - Business Law
BTC - Business & Technology
COM - Communications
DCT - Doctoral
DIS - Dissertation
ECN - Economics
ENG - English
FIN - Finance
IDS - Interdisciplinary
IT - Information Technology
200
300
400
IT 402
IT 403
IT 405
IT 407
IT 408
IT 410
IT 412
IT 413
IT 414
IT 415
IT 416
IT 417
IT 419
IT 422
IT 430
IT 431
IT 440
IT 445
IT 450
IT 451
IT 452
IT 453
IT 456
IT 460
IT 461
IT 462
IT 463
IT 483
IT 490
IT 499
500
KET - Kettering University Courses
MGT - Management
MKT - Marketing
MTH - Math
QM - Quantitative Methods
RES - Research
TAX - Taxation
Walsh College Leadership
Walsh College Faculty
Walsh College Board of Trustees
Walsh College History
Notice of Nondiscrimination
Catalog Links
Catalog Home
Site Map
All Catalogs
IT 463
CRYPTOGRAPHY
Modern cryptographic algorithms and techniques underpin many of the tools, programs, and devices used to provide security in today's organizations. In this course, students will get an in-depth look at the building blocks of cryptographic algorithms, utilize modern ciphers through practical exercises, discuss current issues around cryptography, and gain a deep understanding of how cryptography is used to ensure the confidentiality, integrity, availability, and non-repudiation of organizational information. Symmetric, asymmetric, and un-keyed algorithms will be explored, as well as practical attacks and defenses applicable to cryptographic keys.
Credits
3
Prerequisite
IT 417
Distribution
INFORMATION TECHNOLOGY