At the end of this course the students should have the ability to:
- Design secure system based on cryptographic algorithms.
- Differentiate between types of encryption algorithms and be able to choose the best one based on its level of security.
c. Analyze most common types of attacks and find ways to defend the system from these attacks.
Ill ustrate the use of Public and Private Key algorithms in building secure and modern system.