We may earn an affiliate commission when you visit our partners.
Michael Perry

Although it appears complicated, cryptography is based on simple mathematics. This course will guide you through the theory and application of cryptography so that you will understand for yourself when it is used incorrectly and how to use it well.

Cryptography is at the heart of all information security, from administering infrastructure to writing secure code. To be effective, you need to understand how cryptography works and how far it can be trusted.

In this course,

, you will learn to apply cryptographic algorithms to keep your systems safe.

Here's what you will learn:

Read more

Although it appears complicated, cryptography is based on simple mathematics. This course will guide you through the theory and application of cryptography so that you will understand for yourself when it is used incorrectly and how to use it well.

Cryptography is at the heart of all information security, from administering infrastructure to writing secure code. To be effective, you need to understand how cryptography works and how far it can be trusted.

In this course,

, you will learn to apply cryptographic algorithms to keep your systems safe.

Here's what you will learn:

Cryptography is a way to secure communication between two parties through the use and study of techniques that block or restrict malicious third parties (aka "adversaries") from accessing the data. In its basic from, cryptography is a set of protocols, or aglorithms, created to keep communications and data private and secure.

Modern usage of cryptography range from e-commerce transactions and chip-based card payments to digital currencies and computer passwords.

This is an intermediate level cryptography course designed specifically for IT professionals and developers who are looking to expand their skillsets into cryptography. Before you begin this course you should have a foundational knowledge of algebra and be comfortable at the command line. Knowledge of either C# or Java will help when we get into the coding excersises.

Enroll now

What's inside

Syllabus

Course Overview
Hashing
Symmetric Encryption
Block Ciphers
Read more
Asymmetric Encryption
Public Key Infrastructure
Certificates
Coding Cryptosystems in .NET and Java

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Instructs on cryptography and its applications, critical to IT professionals' responsibilities of securing infrastructure and developing code
Suitable for IT professionals and developers wanting to expand their expertise into cryptography
Assumes prior knowledge of algebra and familiarity with command-line environment, potentially limiting accessibility for those without these foundations
Utilizes a variety of resources, including coding exercises, enhancing the learning experience

Save this course

Save Cryptography Principles for IT Professionals and Developers to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cryptography Principles for IT Professionals and Developers with these activities:
Review your math skills, especially algebra and number theory
A strong foundation in math will help you understand the mathematical concepts behind cryptography.
Browse courses on Algebra
Show steps
  • Review your algebra skills
  • Review your number theory skills
  • Take practice problems to test your understanding
Follow the 'Cryptography for Beginners' tutorial series on Coursera
This tutorial series will provide you with a gentle introduction to cryptography and will help you understand the basics of how cryptography works.
Browse courses on Coursera
Show steps
  • Enroll in the 'Cryptography for Beginners' tutorial series on Coursera
  • Watch the video lectures
  • Complete the quizzes and assignments
Join a study group with other students in the course
Working with other students will help you reinforce your learning and gain different perspectives on the course material.
Show steps
  • Find a group of students to study with
  • Meet regularly to discuss the course material
  • Work together on practice problems and assignments
Show all three activities

Career center

Learners who complete Cryptography Principles for IT Professionals and Developers will develop knowledge and skills that may be useful to these careers:
Data Scientist
Cryptography Principles for IT Professionals and Developers may be useful for Data Scientists, who collect, analyze, and interpret data to solve business problems. Understanding cryptography is a valuable skill for anyone looking to enter this field.
Software Engineer
Cryptographic skills and knowledge are useful for Software Engineers building security features and systems. Cryptography Principles for IT Professionals and Developers can help build a foundation in cryptography, which is essential for anyone looking to enter this field.
IT Auditor
An IT Auditor should be knowledgeable about cryptography, which is essential for anyone looking to enter this field. Cryptography Principles for IT Professionals and Developers may be useful in building this foundation, which is critical to success in this role.
Information Security Analyst
Cryptography Principles for IT Professionals and Developers may be useful to Information Security Analysts, who assess and manage risks to information systems and provide advice on security measures. Understanding cryptography is a valuable skill for anyone looking to enter this field.
Security Analyst
Security Analysts investigate and resolve security issues. Having a foundational knowledge of cryptography is useful to those in this field. Cryptography Principles for IT Professionals and Developers may be useful in building this foundation, which is essential for anyone looking to enter this field.
Data Protection Officer
Cryptography Principles for IT Professionals and Developers may be useful to Data Protection Officers, who are responsible for ensuring that an organization's data is protected from unauthorized access or use. Understanding cryptography is useful for anyone looking to enter this field.
Network Security Engineer
Cryptography Principles for IT Professionals and Developers may be useful for Network Security Engineers, who design, implement, and maintain security measures for computer networks. Understanding cryptography is a valuable skill for anyone looking to enter this field.
Cloud Security Engineer
Cryptography Principles for IT Professionals and Developers may be useful for Cloud Security Engineers, who design, implement, and maintain security measures for cloud computing environments. Understanding cryptography is a valuable skill for anyone looking to enter this field.
Computer and Information Research Scientist
Cryptography Principles for IT Professionals and Developers may be useful to Computer and Information Research Scientists, who conduct research in computer science and information technology. Understanding cryptography is a valuable skill for anyone looking to enter this field.
Cryptographer
Cryptography Principles for IT Professionals and Developers may be useful for Cryptographers, who design and implement cryptographic algorithms and protocols. Understanding cryptography is essential for anyone looking to enter this field.
Software Security Engineer
Cryptography Principles for IT Professionals and Developers may be useful to Software Security Engineers, who design and implement security features into software applications. Understanding cryptography is a valuable skill for anyone looking to enter this field.
Cybersecurity Architect
Cryptography Principles for IT Professionals and Developers may be useful to Cybersecurity Architects, who design and implement security measures to protect an organization's networks and data. Understanding cryptography is a valuable skill for anyone looking to enter this field.
Forensic Computer Analyst
Cryptography Principles for IT Professionals and Developers may be useful to Forensic Computer Analysts, who are responsible for recovering, analyzing, and interpreting digital evidence. Understanding cryptography is a valuable skill for anyone looking to enter this field.
Information Systems Security Officer
Understanding cryptography is useful to Information Systems Security Officers, who are responsible for implementing and managing security measures for an organization. Cryptography Principles for IT Professionals and Developers can build a foundation in cryptography, which is critical to success for anyone looking to enter this field.
Security Systems Administrator
A Security Systems Administrator who wants to advance their career should have a solid knowledge of cryptography. Cryptography Principles for IT Professionals and Developers may be useful in building this foundation, which is critical to success in this field.

Reading list

We've selected 15 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cryptography Principles for IT Professionals and Developers.
Comprehensive reference on cryptography, covering topics such as symmetric and asymmetric encryption, hashing, digital signatures, and elliptic curve cryptography. It valuable resource for anyone looking for a detailed understanding of these topics.
Practical guide to cryptography, covering topics such as symmetric and asymmetric encryption, hashing, digital signatures, and random number generation. It includes source code in C for many of the algorithms discussed, making it a valuable resource for developers.
Provides a comprehensive overview of cryptography and network security, covering topics such as symmetric and asymmetric encryption, hashing, digital signatures, and network security protocols. It valuable resource for anyone looking to gain a deeper understanding of these topics.
Provides a comprehensive overview of modern cryptography, covering topics such as symmetric and asymmetric encryption, hashing, digital signatures, and elliptic curve cryptography. It valuable resource for anyone looking to gain a deeper understanding of these topics.
Provides a comprehensive overview of cryptography engineering, covering topics such as the design of cryptographic algorithms, the implementation of cryptographic protocols, and the evaluation of cryptographic systems. It valuable resource for anyone looking to gain a deeper understanding of these topics.
Provides a comprehensive overview of cryptography, covering topics such as the mathematics of cryptography, cryptographic algorithms, and the applications of cryptography. It valuable resource for anyone looking to gain a deeper understanding of these topics.
Provides a comprehensive overview of cryptography and network security, covering topics such as symmetric and asymmetric encryption, hashing, digital signatures, and network security protocols. It valuable resource for anyone looking to gain a deeper understanding of these topics.
Provides a comprehensive overview of elliptic curve cryptography, covering topics such as the mathematics of elliptic curves, elliptic curve cryptography algorithms, and applications of elliptic curve cryptography. It valuable resource for anyone looking to gain a deeper understanding of these topics.
Provides a comprehensive overview of post-quantum cryptography, covering topics such as the mathematics of post-quantum cryptography, post-quantum cryptography algorithms, and the applications of post-quantum cryptography. It valuable resource for anyone looking to gain a deeper understanding of these topics.
Provides a comprehensive overview of network security, covering topics such as firewalls, intrusion detection systems, virtual private networks, and security protocols. It valuable resource for anyone looking to gain a deeper understanding of these topics.
Provides a comprehensive overview of security engineering, covering topics such as risk assessment, threat modeling, and security controls. It valuable resource for anyone looking to gain a deeper understanding of these topics.
Provides a comprehensive overview of network security, covering topics such as firewalls, intrusion detection systems, virtual private networks, and security protocols. It valuable resource for anyone looking to gain a deeper understanding of these topics.
Provides a comprehensive overview of quantum computing, covering topics such as the basics of quantum mechanics, quantum algorithms, and the applications of quantum computing. It valuable resource for anyone looking to gain a deeper understanding of these topics.
Provides a concise overview of cryptography, covering topics such as symmetric and asymmetric encryption, hashing, and digital signatures. It valuable resource for anyone looking to gain a basic understanding of these topics.
Provides a historical overview of cryptography, covering topics such as the development of ciphers, the Enigma machine, and the rise of modern cryptography. It valuable resource for anyone looking to gain a deeper understanding of the history of cryptography.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser