- Instructor: Robert Russel
- Lectures: 19
- Students: 6870
- Duration: 10 weeks
This course by Academy Europe covers the basics of the science of cryptography. It explains how programmers and network professionals can use cryptography to maintain the privacy of computer data. Starting with the origins of cryptography, it moves on to explain cryptosystems, various traditional and modern ciphers, public key encryption, data integration, message authentication, and digital signatures.
Free Certification
Academy Europe presents high-quality formal diplomas, certificates and e-certificates which are formal proof and recognition of accredited online courses. It shows all student’s abilities to learn and achieve high results and is very useful to promote personal career including with CVs, job applications and self improvements.
How can you get your certificate at Academy Europe?
- You must click “complete” link at the end of every lesson of your course after you finish them.
- When you finish all lessons of course, the “finish course” link is going to be active at the end of last lesson.
- When you click the “finish course” link, you will finish your course on Academy Europe officially. Then, “certificate” page of you completed course will be automatically active.
- You can see and download your certificate online after you click on your “certificate” link.
Audience
This course is meant for students of computer science who aspire to learn the basics of cryptography. It will be useful for networking professionals as well who would like to incorporate various cryptographic algorithms to ensure secure data communication over their networks.
Prerequisites
This course has been prepared with the view to make it useful for almost anyone who is curious about cryptography. A basic knowledge of computer science and a secondary level of mathematics knowledge is sufficient to make the most of this tutorial.
-
Origin of Cryptography
-
Lecture 2.1Origin of Cryptography
-
-
Modern Cryptography
-
Lecture 3.1Modern Cryptography
-
-
Cryptosystems
-
Lecture 4.1Cryptosystems
-
-
Attacks On Cryptosystems
-
Lecture 5.1Attacks On Cryptosystems
-
-
Traditional Ciphers
-
Lecture 6.1Traditional Ciphers
-
-
Modern Symmetric Key Encryption
-
Lecture 7.1Modern Symmetric Key Encryption
-
-
Block Cipher
-
Lecture 8.1Block Cipher
-
-
Feistel Block Cipher
-
Lecture 9.1Feistel Block Cipher
-
-
Data Encryption Standard
-
Lecture 10.1Data Encryption Standard
-
-
Triple DES
-
Lecture 11.1Triple DES
-
-
Advanced Encryption Standard
-
Lecture 12.1Advanced Encryption Standard
-
-
Block Cipher Modes of Operation
-
Lecture 13.1Block Cipher Modes of Operation
-
-
Public Key Encryption
-
Lecture 14.1Public Key Encryption
-
-
Data Integrity in Cryptography
-
Lecture 15.1Data Integrity in Cryptography
-
-
Cryptography Hash functions
-
Lecture 16.1Cryptography Hash functions
-
-
Message Authentication
-
Lecture 17.1Message Authentication
-
-
Cryptography Digital signatures
-
Lecture 18.1Cryptography Digital signatures
-
-
Public Key Infrastructure
-
Lecture 19.1Public Key Infrastructure
-
-
Cryptography Benefits & Drawbacks
-
Lecture 20.1Cryptography Benefits & Drawbacks
-