Python Case Study - Cryptography

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Python Case Study - Cryptography

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
This course offers a hands-on, case study-driven introduction to classical and modern cryptography using Python. Through a progression of real-world cipher implementations, learners will understand foundational encryption principles, apply cipher algorithms programmatically, and analyze vulnerabilities in both classical and modern encryption schemes. Starting with basic reverse and Caesar ciphers, the course advances through brute force attacks, transposition techniques, and affine-based cryptography before culminating in public key cryptosystems like RSA. Learners will gain practical experience in building encryption and decryption tools, evaluating cryptographic strength, and creating secure systems using libraries like PyCrypto. By the end of the course, learners will be able to construct, experiment with, and critically evaluate cryptographic systems for secure communication using Python programming, while also demonstrating fluency in key cryptographic concepts such as hashing, key generation, and symmetric vs. asymmetric encryption.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Use Twitter for OSINT and threat intelligence to enhance security posture ethically and effectively
Medium · Startup
Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Learn to leverage Twitter for OSINT and threat intelligence to strengthen security posture
Medium · Cybersecurity
Your Encrypted Laptop Isn’t as Safe as You Think
Encryption alone may not protect your laptop data from theft, understand the limitations and take additional measures
Medium · Cybersecurity
TCP, Firewalls, Port Forwarding & VPNs — How Data Is Sent and Secured
Learn how data is sent and secured over the internet using TCP, firewalls, port forwarding, and VPNs
Medium · Cybersecurity
Up next
A single PR just hijacked the NPM registry...
Fireship
Watch →