Skip to main content
Print this page
/Institutions/Walsh-College/json/catalogs.json
8698C621-E417-4E9B-8E3D-6BF4091B1B26
Catalog Search
Search Options
Entire Catalog
Programs
Courses
Search
http://walshcollege.smartcatalogiq.com/
8698c621-e417-4e9b-8e3d-6bf4091b1b26
https://searchproxy.smartcatalogiq.com/search
cd640fb1-b741-4ebf-b408-bfee257dab1f
course
/Institutions/Walsh-College/json/2024-2025/Walsh-College-Academic-Catalog-2024-2025-local.json
/Institutions/Walsh-College/json/2024-2025/Walsh-College-Academic-Catalog-2024-2025.json
Contents
Welcome to Walsh College
General Information
Academic Calendar
Admission to Walsh College
Readmission to Walsh College
Financial Aid and Scholarships
Student Services
International Student Information
Veteran Student Information
Walsh College Programs
Walsh College Courses
ACC - Accounting
BL - Business Law
BTC - Business & Technology
BUS - Business
CE - Continuing Education Courses
COM - Communications
DCT - Doctoral
DIS - Dissertation
ECN - Economics
ENG - English
FIN - Finance
IDS - Interdisciplinary
IT - Information Technology
000 Level Courses
200 Level Courses
300 Level Courses
400 Level Courses
IT 402
IT 403
IT 405
IT 407
IT 408
IT 410
IT 412
IT 413
IT 414
IT 415
IT 416
IT 417
IT 419
IT 422
IT 430
IT 431
IT 440
IT 445
IT 451
IT 452
IT 453
IT 456
IT 460
IT 461
IT 462
IT 463
IT 483
IT 490
IT 499
500 Level Courses
700
MDL - Moodle Orientation
MGT - Management
MKT - Marketing
MTH - Math
QM - Quantitative Methods
RES - Research Methods
RSD - Residency
TAX - Taxation
Professional Development
Policies and Procedures
Walsh College Leadership
Walsh College Faculty
Catalog Links
Catalog Home
Site Map
All Catalogs
IT 463
CRYPTOGRAPHY
Modern cryptographic algorithms and techniques underpin many of the tools, programs, and devices used to provide security in today's organizations. In this course, students will get an in-depth look at the building blocks of cryptographic algorithms, utilize modern ciphers through practical exercises, discuss current issues around cryptography, and gain a deep understanding of how cryptography is used to ensure the confidentiality, integrity, availability, and non-repudiation of organizational information. Symmetric, asymmetric, and un-keyed algorithms will be explored, as well as practical attacks and defenses applicable to cryptographic keys.
Credits
3
Prerequisite
IT 417
Distribution
INFORMATION TECHNOLOGY