Course

Introduction to Applied Cryptography

University of Colorado System

Cryptography is an essential component of cybersecurity, with a growing demand for skilled professionals. This course covers classical and modern cryptographic algorithms, symmetric and asymmetric cryptography, and key management. Students will gain a solid foundation in cybersecurity.

  • Learn basic security issues in computer communications
  • Understand classical cryptographic algorithms and their applications
  • Explore symmetric-key and public-key cryptography
  • Gain insights into authentication and digital signatures

This course is suitable for beginners in cybersecurity as well as those with some experience, offering a comprehensive overview of essential cryptographic methods.

Certificate Available ✔

Get Started / More Info
Introduction to Applied Cryptography
Course Modules

This course comprises modules covering classical cryptosystems and core concepts, mathematical foundations for cryptography, symmetric cryptography, and asymmetric cryptography and key management.

Classical Cryptosystems and Core Concepts

Course 1, Classical Cryptosystems, introduces basic concepts and terminology related to cryptography and cryptanalysis. It provides a foundational understanding of classical cryptographic algorithms and their applications. A basic knowledge of computer science and math skills is recommended for this module.

Mathematical Foundations for Cryptography

Course 2, Mathematical Foundations for Cryptography, covers basic mathematical principles essential for understanding symmetric and asymmetric cryptographic methods. This module is suitable for beginners in cybersecurity and requires a basic knowledge of computer science and math skills.

Symmetric Cryptography

The Symmetric Cryptography module delves into shared secret key techniques, substitution, transposition, modern block ciphers, and different modes of block cipher operations. It is cross-listed and is part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization.

Asymmetric Cryptography and Key Management

The Asymmetric Cryptography and Key Management module explores asymmetric cryptographic methods, public-private key pairs, popular asymmetric schemes, and key distribution and management. This module also discusses the mathematical concepts behind the security of asymmetric primitives and requires working knowledge of discrete mathematics.

More Computer Security and Networks Courses

Applied Cryptography

University of Colorado System

Applied Cryptography is a specialization covering essential cryptographic concepts, algorithms, and protocols for information security. It includes symmetric and...

Check Point Jump Start: Cloud Security

Check Point Software Technologies Ltd.

Check Point Jump Start: Cloud Security is a comprehensive course providing insights into cloud security challenges and solutions using Check Point CloudGuard, ideal...

Planning for a Google Workspace Deployment

Google Cloud

Planning for a Google Workspace Deployment is the final course in the Google Workspace Administration series. Explore deployment methodology, provisioning, mail...

6. 警告を発する: 検知と対応

Google

This course focuses on incident detection and response, providing essential skills for entry-level cybersecurity positions.