Skip to main content
Print this page
Select a Catalog
Walsh College Academic Catalog 2024-2025
Walsh College Transfer Resources
Walsh College Academic Catalog 2023-2024
Archive Catalogs
Catalog Search
Search Options
Entire Catalog
Programs
Courses
Search
http://walshcollege.smartcatalogiq.com/
3b56b1c9-a846-4050-bcb6-17ff8c375d0e
https://searchproxy.smartcatalogiq.com/search
ebdf11e4-e62f-4d52-ad3e-ee45252cfffb
course
/Institutions/Walsh-College/json/2023-2024/Walsh-College-Catalog-local.json
/Institutions/Walsh-College/json/2023-2024/Walsh-College-Catalog.json
Contents
Welcome to Walsh College
General Information
Academic Calendar & Important Dates
Admission to Walsh College
Admission on a Student Visa
Readmission to Walsh College
Financial Aid and Scholarships
Walsh College Student Services
International Student Information
Veteran Student Information
Walsh College Programs
Walsh College Courses
ACC - Accounting
BL - Business Law
BTC - Business & Technology
COM - Communications
DCT - Doctoral
DIS - Dissertation
ECN - Economics
ENG - English
FIN - Finance
IDS - Interdisciplinary
IT - Information Technology
200 Level Courses
300 Level Courses
400 Level Courses
IT 402
IT 403
IT 405
IT 407
IT 408
IT 410
IT 412
IT 413
IT 414
IT 415
IT 416
IT 417
IT 419
IT 422
IT 430
IT 431
IT 440
IT 445
IT 451
IT 452
IT 453
IT 456
IT 460
IT 461
IT 462
IT 463
IT 483
IT 490
IT 499
500 Level Courses
700
MGT - Management
MKT - Marketing
MTH - Math
QM - Quantitative Methods
RES - Research Methods
RSD - Residency
TAX - Taxation
Walsh College Policies and Procedures
Walsh College Leadership
Walsh College Faculty
Catalog Links
Catalog Home
Site Map
All Catalogs
IT 463
CRYPTOGRAPHY
Modern cryptographic algorithms and techniques underpin many of the tools, programs, and devices used to provide security in today's organizations. In this course, students will get an in-depth look at the building blocks of cryptographic algorithms, utilize modern ciphers through practical exercises, discuss current issues around cryptography, and gain a deep understanding of how cryptography is used to ensure the confidentiality, integrity, availability, and non-repudiation of organizational information. Symmetric, asymmetric, and un-keyed algorithms will be explored, as well as practical attacks and defenses applicable to cryptographic keys.
Credits
3
Prerequisite
IT 417
Distribution
INFORMATION TECHNOLOGY