RiseUpp Logo
Educator Logo

Introduction to Applied Cryptography

Learn cryptography basics for digital security in internet, mobile, wireless, and cryptocurrency applications.

Learn cryptography basics for digital security in internet, mobile, wireless, and cryptocurrency applications.

This course provides a non-mathematical introduction to applied cryptography and its role in digital security. It covers the functionality and purpose of main cryptographic tools, decision-making in deploying appropriate cryptographic tools, and the wider infrastructure impacting overall security. The course aims to develop an understanding of cryptography's capabilities and limitations in everyday digital applications. It explores core concepts, terminology, and vulnerability points in cryptographic systems. Designed for beginners, it covers topics such as cryptographic toolkit, applications in various digital systems, components of cryptosystems, and methods of attacking cryptosystems. The course emphasizes practical understanding and application of cryptographic principles in real-world scenarios.

4.5

(56 ratings)

8,817 already enrolled

English

21 languages available

Powered by

Provider Logo
Introduction to Applied Cryptography

This course includes

19 Hours

Of Self-paced video lessons

Beginner Level

Completion Certificate

awarded on course completion

2,435

What you'll learn

  • Explain the role of cryptography in digital system security

  • Identify core concepts and terminology in cryptography

  • Understand the breadth of cryptography applications in digital systems

  • Assess vulnerability points in systems deploying cryptography

  • Explain the main components of a cryptosystem

  • Distinguish between symmetric and public-key cryptosystems

Skills you'll gain

Cryptography
Digital security
Encryption
Cryptosystems
Key management
Security services
Cybersecurity

This course includes:

89 Minutes PreRecorded video

12 quizzes, 1 peer review

Access on Mobile, Tablet, Desktop

FullTime access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Provided by

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 4 modules in this course

This course offers a comprehensive introduction to applied cryptography and its crucial role in digital security. It begins by exploring the core security services provided by cryptography and their applications in various digital systems. Students will learn about the structure and components of cryptosystems, including algorithms and keys. The course covers both symmetric and public-key cryptosystems, explaining their uses and differences. A significant portion of the course is dedicated to understanding potential vulnerabilities in cryptographic systems and methods attackers might use to overcome cryptographic protection. Throughout the course, students will engage with real-world applications of cryptography, from securing Wi-Fi networks to protecting mobile calls and supporting cryptocurrencies. By the end of the course, learners will have a solid foundation in the principles of applied cryptography and be able to assess the security implications of cryptographic implementations in various digital contexts.

Introduction to the course and the Cryptographic Toolkit

Module 1 · 5 Hours to complete

Applications of Cryptography

Module 2 · 3 Hours to complete

Cryptosystems

Module 3 · 4 Hours to complete

Attacking Cryptosystems

Module 4 · 6 Hours to complete

Fee Structure

Payment options

Financial Aid

Instructor

Professor Keith M. Martin
Professor Keith M. Martin

4.6 rating

32 Reviews

83,472 Students

2 Courses

Leading Expert in Information Security

Professor Keith M. Martin is a prominent figure in the field of information security, serving at Royal Holloway, University of London, where he is also the director of the EPSRC Centre for Doctoral Training in Cyber Security for the Everyday. With a solid academic foundation that includes a degree in Mathematics from the University of Glasgow and a Ph.D. from Royal Holloway, he has developed a broad research portfolio focusing on the application of cryptography and the geopolitical dimensions of cyber security. Since returning to Royal Holloway in 2000 after research positions at the University of Adelaide and Katholieke Universiteit Leuven, Professor Martin has made significant contributions to education, notably co-creating the successful distance learning MSc in Information Security and leading the Information Security Group from 2010 to 2015. He has authored over 100 research publications and written influential texts such as "Everyday Cryptography" and "Cryptography: The Key to Digital Security, How it Works and Why it Matters." His work extends beyond academia; he actively engages with diverse audiences through courses and presentations on cyber security, making complex concepts accessible to both specialists and the general public.

Introduction to Applied Cryptography

This course includes

19 Hours

Of Self-paced video lessons

Beginner Level

Completion Certificate

awarded on course completion

2,435

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

4.5 course rating

56 ratings

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.