Cryptography

  • 4.8
Approx. 14 hours to complete

Course Summary

This course will teach you the basics of cryptography and its various applications in securing communications and data. You'll learn about encryption methods, digital signatures, and how to use cryptographic tools to protect sensitive information.

Key Learning Points

  • Gain a solid foundation in cryptography principles and techniques
  • Explore real-world applications of cryptography in secure communication and data protection
  • Learn how to use cryptographic tools to secure your own data and communications

Related Topics for further study


Learning Outcomes

  • Understand the basic principles and techniques of cryptography
  • Apply cryptography to secure communication and data protection
  • Use cryptographic tools to protect your own data and communications

Prerequisites or good to have knowledge before taking this course

  • Familiarity with basic algebra
  • Basic programming skills in any language

Course Difficulty Level

Intermediate

Course Format

  • Online self-paced course
  • Video lectures with quizzes and assignments
  • Estimated time commitment: 24-36 hours

Similar Courses

  • Applied Cryptography
  • Cryptography and Information Theory
  • Cryptography II

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Whitfield Diffie
  • Adi Shamir

Related Books

Description

Welcome to Cryptography!

Outline

  • Understand and Apply Fundamental Concepts of Cryptography
  • Welcome to Cryptography
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: High Work Factor
  • Fundamental Concepts of Cryptography: Block Ciphers
  • Fundamental Concepts of Cryptography: Basic Block Cipher Modes
  • Fundamental Concepts of Cryptography: Evaluation of Algorithms
  • Fundamental Concepts of Cryptography: Algorithm Characteristics
  • Fundamental Concepts of Cryptography: Attacks
  • Fundamental Concepts of Cryptography: The Birthday Paradox
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: Key Concepts and Definitions
  • Fundamental Concepts of Cryptography: High Work Factor
  • Fundamental Concepts of Cryptography: Block Ciphers
  • Fundamental Concepts of Cryptography: Basic Block Cipher Modes
  • Fundamental Concepts of Cryptography: Evaluation of Algorithms
  • Fundamental Concepts of Cryptography: Algorithm Characteristics
  • Fundamental Concepts of Cryptography: Attacks
  • Fundamental Concepts of Cryptography: The Birthday Paradox
  • Quiz 1
  • Understand Requirements for Cryptography
  • Fundamental Concepts of Cryptography: Salting
  • Fundamental Concepts of Cryptography: Symmetric Cryptography
  • Fundamental Concepts of Cryptography: Key Distribution
  • Fundamental Concepts of Cryptography: Additional Algorithms
  • Fundamental Concepts of Cryptography: Asymmetric Cryptography
  • Fundamental Concepts of Cryptography: Using Public Key Cryptography
  • Fundamental Concepts of Cryptography: Attacking RSA
  • Fundamental Concepts of Cryptography: Message Digests
  • Fundamental Concepts of Cryptography: Chosen Plain-Text
  • Fundamental Concepts of Cryptography: Known Plaintext
  • Fundamental Concepts of Cryptography: Dictionary Attack
  • Fundamental Concepts of Cryptography: Factoring Attack
  • Understand Requirements For Cryptography: Data Sensitivity
  • Understand Requirements For Cryptography: Data Protection Directive
  • Fundamental Concepts of Cryptography: Salting
  • Fundamental Concepts of Cryptography: Symmetric Cryptography
  • Fundamental Concepts of Cryptography: Key Distribution
  • Fundamental Concepts of Cryptography: Additional Algorithms
  • Fundamental Concepts of Cryptography: Asymmetric Cryptography
  • Fundamental Concepts of Cryptography: Using Public Key Cryptography
  • Fundamental Concepts of Cryptography: Attacking RSA
  • Fundamental Concepts of Cryptography: Message Digests
  • Fundamental Concepts of Cryptography: Chosen Plain-Text
  • Fundamental Concepts of Cryptography: Known Plaintext
  • Fundamental Concepts of Cryptography: Dictionary Attack
  • Fundamental Concepts of Cryptography: Factoring Attack
  • Understand Requirements For Cryptography: Data Sensitivity
  • Understand Requirements For Cryptography: Data Protection Directive
  • Quiz 2
  • Operate and Implement Cryptographic System
  • Operate and Implement Cryptographic System: PKI
  • Operate and Implement Cryptographic System: X.509 Certification
  • Operate and Implement Cryptographic System: PKI Activity
  • Operate and Implement Cryptographic System: Standards
  • Operate and Implement Cryptographic System: Truly Random
  • Operate and Implement Cryptographic System: Key Storage and Destruction
  • Operate and Implement Cryptographic System: Factors Affecting Risk
  • Operate and Implement Cryptographic System: Secure Protocols
  • Operate and Implement Cryptographic System: Digital Signatures
  • Operate and Implement Cryptographic System: PKI
  • Operate and Implement Cryptographic System: X.509 Certification
  • Operate and Implement Cryptographic System: PKI Activity
  • Operate and Implement Cryptographic System: Standards
  • Operate and Implement Cryptographic System: Truly Random
  • Operate and Implement Cryptographic System: Key Storage and Destruction
  • Operate and Implement Cryptographic System: Factors Affecting Risk
  • Operate and Implement Cryptographic System: Secure Protocols
  • Operate and Implement Cryptographic System: Digital Signatures
  • Quiz 3
  • Cryptography Case Study
  • End-of-Course Assessment
  • SSCP Exam Information
  • Cryptography Assessment

Summary of User Reviews

The Cryptography SSCP course on Coursera has received positive reviews from users. Many users found the course to be comprehensive and well-structured, with engaging lectures and practical exercises.

Key Aspect Users Liked About This Course

Comprehensive and well-structured course with engaging lectures and practical exercises.

Pros from User Reviews

  • Clear and concise explanations of complex topics
  • Engaging and knowledgeable instructors
  • Practical exercises that reinforce learning
  • Great preparation for the SSCP certification exam

Cons from User Reviews

  • Some users found the course to be too basic for their level of knowledge
  • Course materials could be more up-to-date
  • Limited interaction with instructors and other students
  • Some technical issues with the online platform
English
Available now
Approx. 14 hours to complete
(ISC)² Education & Training
(ISC)²
Coursera

Instructor

Share
Saved Course list
Cancel
Get Course Update
Computer Courses