Cryptography is an essential part of secure but accessible communication that's critical for our everyday life and organisations use it to protect their privacy and keep their conversations and data confidential. This course provides a comprehensive introduction to the fascinating world of cryptography, covering both historical cyphers and modern-day cryptographic techniques.
An Introduction to Cryptography
Instructors: Sam Wilson
Sponsored by Mojatu Foundation
2,220 already enrolled
What you'll learn
Describe the fundamental concepts and principles of cryptography.
Explore historical cyphers and their significance in the evolution of cryptography.
Investigate modern cryptographic algorithms and protocols.
Gain digital skills as part of Click Start! Follow the link in the instructor bio to see if you're eligible for FREE access to this course and more..
Details to know
Add to your LinkedIn profile
4 assignments
See how employees at top companies are mastering in-demand skills
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 2 modules in this course
Welcome to the first week of the course! We will start the week with an exploration of what cryptography is and what it is used for and then move on to look at some cryptographic techniques, via some ancient cryptography. Although these ancient cryptographic techniques are not very useful in modern life, they are good at demonstrating some of the concepts that are still used in modern day cryptography. Week 1 lays the foundation for Week 2, when we will turn our attention to modern cryptography.
What's included
2 videos15 readings1 assignment4 discussion prompts
Welcome to Week 2. In this week you will bring your knowledge about cryptography up to date in the modern day. This is where we start to look at more complex methods for more complex contemporary requirements. To start off, you will be introduced to a concept called 'public key cryptography' which is extensively used on the internet. You will then learn about hash functions and how some cryptographic techniques can be used to produce a digital signature.
What's included
1 video15 readings3 assignments2 discussion prompts
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Computer Science
Johns Hopkins University
University of London
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy