Learn cryptography basics for digital security in internet, mobile, wireless, and cryptocurrency applications.
Learn cryptography basics for digital security in internet, mobile, wireless, and cryptocurrency applications.
This course provides a non-mathematical introduction to applied cryptography and its role in digital security. It covers the functionality and purpose of main cryptographic tools, decision-making in deploying appropriate cryptographic tools, and the wider infrastructure impacting overall security. The course aims to develop an understanding of cryptography's capabilities and limitations in everyday digital applications. It explores core concepts, terminology, and vulnerability points in cryptographic systems. Designed for beginners, it covers topics such as cryptographic toolkit, applications in various digital systems, components of cryptosystems, and methods of attacking cryptosystems. The course emphasizes practical understanding and application of cryptographic principles in real-world scenarios.
4.5
(56 ratings)
8,817 already enrolled
Instructors:
English
21 languages available
What you'll learn
Explain the role of cryptography in digital system security
Identify core concepts and terminology in cryptography
Understand the breadth of cryptography applications in digital systems
Assess vulnerability points in systems deploying cryptography
Explain the main components of a cryptosystem
Distinguish between symmetric and public-key cryptosystems
Skills you'll gain
This course includes:
89 Minutes PreRecorded video
12 quizzes, 1 peer review
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by
Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.
There are 4 modules in this course
This course offers a comprehensive introduction to applied cryptography and its crucial role in digital security. It begins by exploring the core security services provided by cryptography and their applications in various digital systems. Students will learn about the structure and components of cryptosystems, including algorithms and keys. The course covers both symmetric and public-key cryptosystems, explaining their uses and differences. A significant portion of the course is dedicated to understanding potential vulnerabilities in cryptographic systems and methods attackers might use to overcome cryptographic protection. Throughout the course, students will engage with real-world applications of cryptography, from securing Wi-Fi networks to protecting mobile calls and supporting cryptocurrencies. By the end of the course, learners will have a solid foundation in the principles of applied cryptography and be able to assess the security implications of cryptographic implementations in various digital contexts.
Introduction to the course and the Cryptographic Toolkit
Module 1 · 5 Hours to complete
Applications of Cryptography
Module 2 · 3 Hours to complete
Cryptosystems
Module 3 · 4 Hours to complete
Attacking Cryptosystems
Module 4 · 6 Hours to complete
Fee Structure
Payment options
Financial Aid
Instructor
Leading Expert in Information Security
Professor Keith M. Martin is a prominent figure in the field of information security, serving at Royal Holloway, University of London, where he is also the director of the EPSRC Centre for Doctoral Training in Cyber Security for the Everyday. With a solid academic foundation that includes a degree in Mathematics from the University of Glasgow and a Ph.D. from Royal Holloway, he has developed a broad research portfolio focusing on the application of cryptography and the geopolitical dimensions of cyber security. Since returning to Royal Holloway in 2000 after research positions at the University of Adelaide and Katholieke Universiteit Leuven, Professor Martin has made significant contributions to education, notably co-creating the successful distance learning MSc in Information Security and leading the Information Security Group from 2010 to 2015. He has authored over 100 research publications and written influential texts such as "Everyday Cryptography" and "Cryptography: The Key to Digital Security, How it Works and Why it Matters." His work extends beyond academia; he actively engages with diverse audiences through courses and presentations on cyber security, making complex concepts accessible to both specialists and the general public.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.5 course rating
56 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.