Cryptography is an essential component of cybersecurity, with a growing demand for skilled professionals. This course covers classical and modern cryptographic algorithms, symmetric and asymmetric cryptography, and key management. Students will gain a solid foundation in cybersecurity.
This course is suitable for beginners in cybersecurity as well as those with some experience, offering a comprehensive overview of essential cryptographic methods.
Certificate Available ✔
Get Started / More InfoThis course comprises modules covering classical cryptosystems and core concepts, mathematical foundations for cryptography, symmetric cryptography, and asymmetric cryptography and key management.
Course 1, Classical Cryptosystems, introduces basic concepts and terminology related to cryptography and cryptanalysis. It provides a foundational understanding of classical cryptographic algorithms and their applications. A basic knowledge of computer science and math skills is recommended for this module.
Course 2, Mathematical Foundations for Cryptography, covers basic mathematical principles essential for understanding symmetric and asymmetric cryptographic methods. This module is suitable for beginners in cybersecurity and requires a basic knowledge of computer science and math skills.
The Symmetric Cryptography module delves into shared secret key techniques, substitution, transposition, modern block ciphers, and different modes of block cipher operations. It is cross-listed and is part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization.
The Asymmetric Cryptography and Key Management module explores asymmetric cryptographic methods, public-private key pairs, popular asymmetric schemes, and key distribution and management. This module also discusses the mathematical concepts behind the security of asymmetric primitives and requires working knowledge of discrete mathematics.
Applied Cryptography is a specialization covering essential cryptographic concepts, algorithms, and protocols for information security. It includes symmetric and...
Check Point Jump Start: Cloud Security is a comprehensive course providing insights into cloud security challenges and solutions using Check Point CloudGuard, ideal...
Planning for a Google Workspace Deployment is the final course in the Google Workspace Administration series. Explore deployment methodology, provisioning, mail...
This course focuses on incident detection and response, providing essential skills for entry-level cybersecurity positions.