Course

Applied Cryptography

University of Colorado System

This specialization in Applied Cryptography is designed for learners interested in pursuing a career in computer security or cybersecurity-related fields. Through four comprehensive courses, participants will gain in-depth knowledge of cryptographic tools and their design, covering a wide range of topics such as symmetric and asymmetric cryptography, hash functions, and key management.

The four courses included in this specialization are:

  1. Cryptography and Information Theory
  2. Symmetric Cryptography
  3. Asymmetric Cryptography and Key Management
  4. Cryptographic Hash and Integrity Protection

Each course delves into specific aspects of cryptography, providing a solid foundation for understanding and applying cryptographic principles in real-world scenarios. Learners will explore classical cryptographic algorithms, message authentication codes, digital signatures, and more.

Certificate Available ✔

Get Started / More Info
Applied Cryptography
Course Modules

The Applied Cryptography specialization consists of four courses: Cryptography and Information Theory, Symmetric Cryptography, Asymmetric Cryptography and Key Management, and Cryptographic Hash and Integrity Protection. These courses cover essential cryptographic concepts, algorithms, and protocols for information security.

Cryptography and Information Theory

Welcome to Cryptography and Information Theory! This course provides a comprehensive understanding of cryptography and information theory, exploring concepts such as entropy, information coding, and information-theoretical security. It contrasts information-theoretic security and computational security, laying the groundwork for cryptographic algorithm construction and security analyses.

Symmetric Cryptography

Welcome to Symmetric Cryptography! This course focuses on the use of shared secret keys for message confidentiality, covering classical cryptography techniques and modern block ciphers such as DES, 3-DES, and AES. Learners will also explore different modes of block cipher operations.

Asymmetric Cryptography and Key Management

Welcome to Asymmetric Cryptography and Key Management! This course delves into the principles of asymmetric cryptography, covering popular schemes like RSA and the Diffie-Hellman Key Exchange protocol. Key distribution and management for both symmetric and public keys are also discussed.

Cryptographic Hash and Integrity Protection

Welcome to Cryptographic Hash and Integrity Protection! This course explores cryptographic hash functions, hash chains, and hash trees, as well as message authentication through symmetric key-based MAC and digital signatures based on asymmetric cryptography.

More Computer Security and Networks Courses

Introduction to Applied Cryptography

University of Colorado System

Introduction to Applied Cryptography provides a comprehensive understanding of cryptographic methods, including classical and modern algorithms, symmetric and asymmetric...

Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud

University of Illinois at Urbana-Champaign

Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud provides a comprehensive exploration of Cloud Computing, Big Data, and data analytics,...

Planning for a Google Workspace Deployment

Google Cloud

Planning for a Google Workspace Deployment is the final course in the Google Workspace Administration series. Explore deployment methodology, provisioning, mail...

7. Python を使ったサイバーセキュリティ タスクの自動化

Google

Python を使ったサイバーセキュリティ タスクの自動化コースは、Pythonを学び、サイバーセキュリティのタスクを自動化する方法を学ぶことができるコースです。...