This specialization in Applied Cryptography is designed for learners interested in pursuing a career in computer security or cybersecurity-related fields. Through four comprehensive courses, participants will gain in-depth knowledge of cryptographic tools and their design, covering a wide range of topics such as symmetric and asymmetric cryptography, hash functions, and key management.
The four courses included in this specialization are:
Each course delves into specific aspects of cryptography, providing a solid foundation for understanding and applying cryptographic principles in real-world scenarios. Learners will explore classical cryptographic algorithms, message authentication codes, digital signatures, and more.
Certificate Available ✔
Get Started / More InfoThe Applied Cryptography specialization consists of four courses: Cryptography and Information Theory, Symmetric Cryptography, Asymmetric Cryptography and Key Management, and Cryptographic Hash and Integrity Protection. These courses cover essential cryptographic concepts, algorithms, and protocols for information security.
Welcome to Cryptography and Information Theory! This course provides a comprehensive understanding of cryptography and information theory, exploring concepts such as entropy, information coding, and information-theoretical security. It contrasts information-theoretic security and computational security, laying the groundwork for cryptographic algorithm construction and security analyses.
Welcome to Symmetric Cryptography! This course focuses on the use of shared secret keys for message confidentiality, covering classical cryptography techniques and modern block ciphers such as DES, 3-DES, and AES. Learners will also explore different modes of block cipher operations.
Welcome to Asymmetric Cryptography and Key Management! This course delves into the principles of asymmetric cryptography, covering popular schemes like RSA and the Diffie-Hellman Key Exchange protocol. Key distribution and management for both symmetric and public keys are also discussed.
Welcome to Cryptographic Hash and Integrity Protection! This course explores cryptographic hash functions, hash chains, and hash trees, as well as message authentication through symmetric key-based MAC and digital signatures based on asymmetric cryptography.
Introduction to Applied Cryptography provides a comprehensive understanding of cryptographic methods, including classical and modern algorithms, symmetric and asymmetric...
Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud provides a comprehensive exploration of Cloud Computing, Big Data, and data analytics,...
Planning for a Google Workspace Deployment is the final course in the Google Workspace Administration series. Explore deployment methodology, provisioning, mail...
Python を使ったサイバーセキュリティ タスクの自動化コースは、Pythonを学び、サイバーセキュリティのタスクを自動化する方法を学ぶことができるコースです。...