Cyber Security: Applied Cryptography

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Cyber Security: Applied Cryptography

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
This Cyber Security: Applied Cryptography course equips you with practical skills to apply cryptographic tools and technologies for real-world security challenges. You will gain capabilities to design, evaluate, and apply cryptographic solutions across enterprise and emerging technology contexts. By the end of this course, you will be able to: • Apply foundational cryptographic building blocks, including symmetric/asymmetric encryption and Public-Key Infrastructure (PKI). •Secure data at rest and in motion, using full-disk encryption and ensuring authenticity. • Utilize cryptography in network security protocols, VPNs, wireless systems, and anonymous browsing technologies like TOR. • Protect intellectual property, software integrity, and operate within secure hardware environments such as HSMs and Trusted Execution Environments. • Understand the cryptographic core of blockchain systems for distributed ledgers, smart contracts, and secure voting. • Prepare for future privacy-preserving technologies like Homomorphic Encryption, Federated Learning, Multi-Party Computation, and post-quantum cryptography. This course is for cyber security professionals, software engineers, or tech decision-makers. To be successful, you should have a basic understanding of computer networks and fundamental security concepts.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Storing JWTs in localStorage: A Security Guide for Web Developers
Learn why storing JWTs in localStorage is insecure and how to secure your web application's authentication, which is crucial for protecting user data
Dev.to · Damilola Owolabi
Inside Consumer DVRs — Hardware, Firmware & Network Security Evaluation
Learn about the hardware, firmware, and network security of consumer DVRs through a reverse engineering analysis of the Hikvision DS-7204HUHI-K
Medium · Cybersecurity
Cómo construimos un SOC con honeypot e IA local
Learn how to build a Security Operations Center (SOC) using honeypot and local AI to detect and prevent cyber threats
Dev.to · Yoandy Ramirez Delgado
Credentials in web applications: how to store them properly
Learn how to store credentials properly in web applications to prevent breaches
Dev.to · Ian Johnson
Up next
A single PR just hijacked the NPM registry...
Fireship
Watch →