If you’re interested in enrolling in the Master of Science: Cybersecurity program through UW Online Collaboratives, you might be wondering what a typical course in the program is like.
CYB 710, Introductory Cryptography, is a core course in the program curriculum. Cryptography is the science of securing communication so that parties who are not meant to receive a transmission can neither read nor alter it.
Cryptography is derived from the Greek words kryptos (which means “hidden”) and graphein (“to write”), translating to “secret writing.” While cryptography has been used since ancient times, modern implementations are computational and mathematical. Cryptography is used in banking, internet communication, and much more to protect the integrity of data and ensure confidentiality.
Here are some frequently asked questions about the course with answers provided by the course instructors–including David Furcy, David Penniston and George Thomas:
What do students learn in this course and how can they apply it on the job?
Students learn the basics of cryptography, which is the foundation of secure software. This knowledge can be applied in various cybersecurity roles. For example, graduates might use cryptographic tools to design solutions, or use their understanding of the strengths and weaknesses of various cryptographic protocols to assess the overall security of their organizations.
What kinds of assignments will they complete?
They complete a mixture of math and programming assignments, which are designed to illustrate foundational or application-based features of cryptography.
How many hours per week can students expect to spend on the course?
Students should expect to spend 9 hours per week.
Do students in the course interact? If so, how much?
Students interact through discussion forums that are tied to specific assignments. There are no group projects.
What resources will students need to complete the course?
Students can easily and freely set up the programming environment for hands-on work (i.e., Python) on their own computer.
What do you like most about teaching this course?
This course allows instructors to implement a variety of cryptographic primitives (e.g., symmetric and asymmetric encryption algorithms, secure hash functions, pseudo-random number generators). This process is not only fun and rewarding, it also helps us further develop cryptosystem design skills. We find it enjoyable to grow our own skillset alongside students.
Learn More About Cybersecurity
Curious about what else you’ll learn in the courses and how it will apply to your current and future roles in the cybersecurity field? See the program’s curriculum or reach out to a helpful enrollment adviser at 608-800-6762 or learn@uwex.wisconsin.edu.