- Level Foundation
- Course by University of London
-
Offered by
About
Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience.Modules
1.0 Introduction to the course
1
Discussions
- Introduce yourself
2
Videos
- Introduction to the course
- How to setup a study journal
4
Readings
- Course syllabus
- Starting your studies
- Principles of good peer feedback in peer review assignment
- Everyday cryptography: fundamental principles and applications by Keith Martyn
1.1 Why Cryptography?
1
Assignment
- Stealing data
1
Discussions
- Comparing the physical and digital world
2
Videos
- Introduction to cryptography
- Physical world security services
2
Readings
- First thoughts on cryptography
- Risks to information
1.2 Security Services and Cryptographic Primitives
2
Assignment
- Cryptography and availability
- Week 1 test
1
Discussions
- Examples using services
2
Videos
- Core services
- Week 1 summary
5
Readings
- Security services
- Relationship between services
- Cryptographic terminology
- Activity: Identifying algorithms
- Reflection
2.1 Identifying Applications of Cryptography
2
Discussions
- Applications of cryptography
- First look at the Big Six
2
Videos
- Introduction to applications of cryptography
- Introduction to the Big Six
2.2 Matching Services to Applications
1
Assignment
- Week 2 test
1
Discussions
- Services for other Big Six
2
Videos
- Wi-Fi services
- Week 2 summary
2
Readings
- Case study: Supporting mobile call protection
- Reflection
3.1 Basic Model of a Cryptosystem
2
Assignment
- Is this a cryptosystem?
- Navajo code talker
1
Discussions
- Cryptography, steganography and access control
2
Videos
- Introduction to cryptosystems
- Algorithms and keys
1
Readings
- Model of a cryptosystem
3.2 Two Types of Cryptosystem
1
Assignment
- Week 3 test
2
Discussions
- Key management implications
- Symmetric or Public-key?
2
Videos
- How different types of cryptosystem are used
- Week 3 summary
2
Readings
- Two types of cryptosystem
- Reflection
4.1 Attack Assumptions
2
Assignment
- Kerckhoff assumptions
- Public v proprietary
1
Discussions
- Single points of failure
1
Videos
- Introduction to attacking cryptosystems
1
Readings
- Security assumptions
4.2 Breaking Cryptosystems
3
Assignment
- Practicalities of key search
- DES and AES key searches
- Week 4 test
1
Peer Review
- Two worlds – which is securer?
1
Discussions
- Big Six vulnerabilities
3
Videos
- Points of weakness
- Two worlds
- Week 4 summary
6
Readings
- Exhaustive key search
- Activity: Large numbers
- Key lengths
- Classes of attack
- Latest thoughts on cryptography
- Reflection
Course summary
1
Videos
- Course summary
Auto Summary
"Introduction to Applied Cryptography" is a foundational course in the Data Science & AI domain, presented by Coursera. It offers a non-mathematical exploration of cryptography's role in ensuring digital security across various applications like the internet, mobile phones, and cryptocurrency. Learners will understand key cryptographic tools, their purposes, and how to choose appropriate ones for different scenarios. The course also covers the broader infrastructure and vulnerabilities associated with cryptography. Available through Starter and Professional subscriptions, it's ideal for those seeking to grasp digital security fundamentals.

Professor Keith M. Martin