We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

Cryptography and Hashing Overview

Stefano M. Stefan

Continue learning about blockchain technology by diving into the nature of ownership and how the blockchain is one way to approach decentralized transaction handling. This course also demystifies cryptography and hashing, which are critical for authenticating users and guaranteeing transaction privacy.

Read more

Continue learning about blockchain technology by diving into the nature of ownership and how the blockchain is one way to approach decentralized transaction handling. This course also demystifies cryptography and hashing, which are critical for authenticating users and guaranteeing transaction privacy.

This course requires the purchase of two books for the completion of assignments:

Drescher, D. (2017). Blockchain Basics: A Non-Technical Introduction in 25 Steps. (ISBN-13: 978-1484226032)

Antonoupoulos, A. M. (2017). The Internet of Money, Volume Two. (ISBN-13: 978-1947910065)

Enroll now

What's inside

Syllabus

The Nature of Ownership
This week we will examine and study the ways that the blockchain keeps track of ownership transactions through the use of electronic ledgers. After an item changes hands many times, one can literally see each handoff by looking at the continuously growing string of data blocks in the blockchain.
Read more
Organizational Usage of Blockchain Technology
In this second week we will explore and discuss the vast array of benefits that a blockchain technology system can bring to different industries and business markets. We will also consider together how Blockchain technology is an ideal system to manage educational achievement and merit.
Cryptography and Hashing
The key to the blockchain’s success is the use of hash values and encryption. These are the same technologies that allow you to log into your favorite website without revealing your password and the same technologies that allow you to send a private, encrypted text message. By the end of the week you will apply a hashing algorithm to a character string and see the results.
Applying Hashes
As you will see in this final week, it is sometimes important to step back from a purely functional discussion of what the blockchain can do to what it means when it does it. You will apply cryptography and hashing to a simple scenario in order to determine the authenticity of a simulated email message.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Introduces blockchain technology, which is a rapidly growing field, and has applications in various industries
Helps learners understand the nature of ownership, which is a foundational concept in blockchain technology
Demystifies cryptography and hashing, which are essential for authenticating users and securing transactions on the blockchain
Provides a hands-on approach to applying hashes, which helps learners develop a practical understanding of this key blockchain concept
Requires the purchase of two books, which can be an additional expense for learners

Save this course

Save Cryptography and Hashing Overview to your list so you can find it easily later:
Save

Reviews summary

Engaging overview of cryptography and hashing

Learners say this engaging course provides a strong overview of the fundamentals of cryptography and hashing. It's particularly well-suited for beginners in the field, providing a clear and structured introduction to the subject matter. Instructors are praised for their expertise and clear explanations, ensuring that learners grasp the concepts presented.
Course materials sufficient, additional purchases unnecessary.
"The "course" adds almost nothing to it."
Knowledgeable, clear explanations.
"Instructors are praised for their expertise."
"Clear explanations ensure that learners grasp the concepts presented."
Clear, structured introduction to cryptography and hashing.
"Provides a strong overview of the fundamentals of cryptography and hashing."
"Clear and structured introduction to the subject matter."
"Well-suited for beginners in the field."

Activities

Coming soon We're preparing activities for Cryptography and Hashing Overview. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Cryptography and Hashing Overview will develop knowledge and skills that may be useful to these careers:
Penetration Tester
Penetration Testers help to identify vulnerabilities in a company's IT systems.
Information Security Analyst
Information Security Analysts help to protect companies from cyber attacks, such as hacking and data breaches.
Cybersecurity Analyst
Cybersecurity Analysts help to protect companies from cyber attacks, such as hacking and data breaches.
IT Auditor
IT Auditors ensure that a company's IT systems are operating in a secure and efficient manner.
Security Engineer
Security Engineers design, build, and maintain security systems.
Systems Administrator
Systems Administrators manage and maintain computer systems.
Network Engineer
Network Engineers design, build, and maintain computer networks.
Data Scientist
Data Scientists analyze data to help companies make informed decisions.
IT Consultant
IT Consultants help companies to improve their IT systems and processes.
Web Developer
Web Developers design, build, and maintain websites.
Software Developer
Software Developers design, build, and maintain software applications.
Technical Support Specialist
Technical Support Specialists provide technical support to users of computer systems.
Business Analyst
Business Analysts strive to identify the most efficient and effective way to complete a business process.
Financial Analyst
Financial Analysts help companies make investment decisions.
Auditor
Auditors ensure a company is operating in a financially responsible manner, without errors.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cryptography and Hashing Overview.
Classic in the field of Bitcoin and cryptocurrency. It provides a deep dive into the technical details of Bitcoin, including its cryptography, consensus mechanisms, and transaction processing.
Provides a comprehensive overview of blockchain technology, its potential applications, and the challenges it faces.
Provides a comprehensive overview of blockchain technology, covering its principles, applications, and challenges. It good starting point for those who want to learn more about blockchain technology.
Provides a comprehensive guide to investing in cryptocurrencies. It covers everything from the basics of cryptocurrency trading to the latest investment strategies.
Beginner-friendly introduction to blockchain technology. It covers the basics of Bitcoin, Ethereum, and other blockchain platforms.
Comprehensive guide to blockchain technology for non-technical readers. It covers everything from the basics of blockchain to the latest developments in the field.
Provides an overview of the cryptocurrency market, including the different types of cryptocurrencies, how they work, and how to invest in them.
Explores the potential of blockchain technology to transform a wide range of industries, from finance to healthcare to supply chain management.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser