Delve into cryptographic principles, explore key encryption methods, authentication, and data integrity techniques, and learn about real-world applications and government policies surrounding information security.
Beginner
181 Lessons
30h
Certificate of Completion
Delve into cryptographic principles, explore key encryption methods, authentication, and data integrity techniques, and learn about real-world applications and government policies surrounding information security.
AI-POWERED
AI-POWERED
This course includes
This course includes
Course Overview
In recent years, the world has witnessed an exponential increase in data. As applications—such as those belonging to financial institutions and governments—become more widespread and the traffic over insecure networks increases, it becomes increasingly important to understand information security principles and techniques. With this goal in mind, “Everyday Cryptography” introduces learners to different aspects of cryptography. The course begins by explaining the key pillars of information security. It intr...
What You'll Learn
An understanding of the fundamental principles of information security
A working knowledge of symmetric (or private key) encryption
A working knowledge of asymmetric (or public key) encryption
Familiarity with techniques for data integrity and authentication
An understanding of key management techniques
Ability to assess the strengths and weaknesses of cryptographic protocols
Introduction to cryptography for personal devices and day-to-day activities
An understanding of potential issues when cryptography and government policy come face to face
What You'll Learn
An understanding of the fundamental principles of information security
Show more
Course Content
Introduction
Basic Principles
Historical Cryptosystems
Theoretical versus Practical Security
Symmetric Encryption
Public-Key Encryption
14 Lessons
Data Integrity
11 Lessons
Digital Signature Schemes
9 Lessons
Entity Authentication
8 Lessons
Cryptographic Protocols
16 Lessons
Key Management
15 Lessons
Public-Key Management
10 Lessons
Cryptographic Applications
31 Lessons
Cryptography for Personal Devices
5 Lessons
Control of Cryptography
6 Lessons
Mathematics Appendix
6 Lessons
Closing Remarks
2 Lessons
Course Author
Trusted by 1.4 million developers working at companies
Anthony Walker
@_webarchitect_
Evan Dunbar
ML Engineer
Carlos Matias La Borde
Software Developer
Souvik Kundu
Front-end Developer
Vinay Krishnaiah
Software Developer
Eric Downs
Musician/Entrepeneur
Kenan Eyvazov
DevOps Engineer
Souvik Kundu
Front-end Developer
Eric Downs
Musician/Entrepeneur
Anthony Walker
@_webarchitect_
Evan Dunbar
ML Engineer
See how Educative uses AI to make your learning more immersive than ever before.