TrueschoTruescho
All Courses
Cyber Security: Applied Cryptography
Coursera
Course
Unknown

Cyber Security: Applied Cryptography

Macquarie University

This course equips you with practical skills to apply cryptographic tools and design security solutions across various technology contexts.

Unknown6 weeksEnglish

About this Course

• Watch our course introduction video before you enroll! (copy and paste into browser) https://vimeo.com/1176025403 This Cyber Security: Applied Cryptography course equips you with practical skills to apply cryptographic tools and technologies for real-world security challenges. You will gain capabilities to design, evaluate, and apply cryptographic solutions across enterprise and emerging technology contexts. By the end of this course, you will be able to: • Apply foundational cryptographic building blocks, including symmetric/asymmetric encryption and Public-Key Infrastructure (PKI). •Secure data at rest and in motion, using full-disk encryption and ensuring authenticity. • Utilize cryptography in network security protocols, VPNs, wireless systems, and anonymous browsing technologies like TOR. • Protect intellectual property, software integrity, and operate within secure hardware environments such as HSMs and Trusted Execution Environments. • Understand the cryptographic core of blockchain systems for distributed ledgers, smart contracts, and secure voting. • Prepare for future privacy-preserving technologies like Homomorphic Encryption, Federated Learning, Multi-Party Computation, and post-quantum cryptography. This course is for cyber security professionals, software engineers, or tech decision-makers. To be successful, you should have a basic understanding of computer networks and fundamental security concepts

What You'll Learn

  • Explain core cryptographic principles and algorithms
  • Secure data with symmetric and asymmetric encryption
  • Apply cryptography in real-world systems like VPNs and blockchain
  • Evaluate cryptographic risks and manage keys securely

Prerequisites

  • No deep prior experience required, basic computer and internet skills helpful
  • Ability to read instructions in English and complete activities

Instructors

M

Matt Bushby

Topics

Computer Security and Networks
Computer Science
Federated Learning
Security Management
Cryptography
Advanced Encryption Standard (AES)
Security Engineering
Network Security
Data Integrity
Key Management

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

أمن الحاسوب والشبكات
علوم الحاسوب
التعلم الموحد
إدارة الأمن
التشفير
معيار التشفير المتقدم
هندسة الأمن
أمن الشبكات
Data Integrity
Key Management

Start Learning Now