cy201_schedule

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
cy201_schedule [2020/10/30 08:53] lenshandcy201_schedule [2022/10/03 10:34] (current) martin
Line 2: Line 2:
  
 ^Week^Date^Day^Topic^ ^Week^Date^Day^Topic^
-|1| |Monday|Module introduction| +|1| |Monday|Module introduction. {{ :cyberdegree:00_cryptography,_mathmatics,_and_algorithms-module_intro_wk1 - Final.pptx |pptx}}
-| | | |Sets, relations and functions| +| | | |Sets, relations and functions. {{ :cyberdegree:00_cryptography,_mathmatics,_and_algorithms-module_core_wk1 - Final - Reference Set.pptx |pptx}}
-| | |Tuesday| |+| | |Tuesday|Graphs and trees | 
 +| | | |automata | 
 +| | |Wednesday|Computability and complexity | 
 +| | | |Main cryptographic techniques | 
 +| | |Thursday|Concepts of authentication, integrity and non-repudiation | 
 +| | | |Symmetric | 
 +| | |Friday|Public key. Issue Assignment 1 |
 | | | | | | | | | |
-| | |Wednesday| | +|2| |Monday|Secure hash {{ :cyberdegree:00_cryptography,_mathmatics,_and_algorithms-module_core_wk2 - Final - Reference Set.pptx |pptx}}
-| | | | | +| | | |Digital signing, certificate authorities 
-| | | | +| | |Tuesday|Block ciphers 
-| | |Thursday| | +| | |Wednesday|How cryptographic techniques are applied and to what end and their limitations 
-| | | | | +| | |Thursday|Examples of badly applied or implemented cryptographic techniques |
-| | |Friday| | +
-| | | | | +
-| |||| +
-|2| |Monday| +
-| | |Tuesday| | +
-| | |Wednesday| | +
-| | |Thursday| |+
 | | | | | | | | | |
 | | |Friday| | | | |Friday| |
-| | | |Issue assignment 1|+| | | ||
 | |||| | ||||
 |3| |Monday| | |3| |Monday| |
  • cy201_schedule.1604048032.txt.gz
  • Last modified: 2020/10/30 08:53
  • by lenshand