Beginner
181 Lessons
30h
Certificate of Completion
Takeaway Skills
An understanding of the fundamental principles of information security
A working knowledge of symmetric (or private key) encryption
A working knowledge of asymmetric (or public key) encryption
Familiarity with techniques for data integrity and authentication
An understanding of key management techniques
Ability to assess the strengths and weaknesses of cryptographic protocols
Introduction to cryptography for personal devices and day-to-day activities
An understanding of potential issues when cryptography and government policy come face to face
Course Overview
In recent years, the world has witnessed an exponential increase in data. As applications—such as those belonging to financial institutions and governments—become more widespread and the traffic over insecure networks increases, it becomes increasingly important to ...Show More
Course Content
Introduction
2 Lessons
Basic Principles
15 Lessons
Historical Cryptosystems
8 Lessons
Theoretical versus Practical Security
9 Lessons
Symmetric Encryption
14 Lessons
Public-Key Encryption
14 Lessons
Data Integrity
11 Lessons
Digital Signature Schemes
9 Lessons
Entity Authentication
8 Lessons
Cryptographic Protocols
16 Lessons
Key Management
15 Lessons
Public-Key Management
10 Lessons
Cryptographic Applications
31 Lessons
Cryptography for Personal Devices
5 Lessons
Control of Cryptography
6 Lessons
Mathematics Appendix
6 Lessons
Closing Remarks
2 Lessons
How You'll Learn
You don’t get better at swimming by watching others. Coding is no different. Practice as you learn with live code environments inside your browser.
Videos are holding you back. The average video tutorial is spoken at 150 words per minute, while you can read at 250. That‘s why our courses are text-based.
Start learning immediately instead of fiddling with SDKs and IDEs. It‘s all on the cloud.
Built-in assessments let you test your skills. Completion certificates let you show them off.