- Level Foundation
- Duration 12 hours
- Course by University of Colorado System
-
Offered by
About
Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove especially useful to you if you are new to cybersecurity Course 1, Classical Cryptosystems, introduces you to basic concepts and terminology related to cryptography and cryptanalysis. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.Modules
Intro to Specialization and Instructors
1
Videos
- About the Instructors
1
Readings
- Get help and meet other learners. Join your Community!
Course Introduction
2
Videos
- Course Introduction
- About the Instructor
2
Readings
- About the Course
- About the Instructor
Lesson 1. What is Cryptography?
1
Videos
- What is Cryptography?
2
Readings
- Lecture Slide - What is Cryptography?
- Additional Reference Material
Lesson 2. Codes and Ciphers
1
Videos
- Codes and Ciphers
2
Readings
- Lecture Slide - Codes and Ciphers
- L2: Additional Reference Material
Lesson 3. What is Cryptanalysis?
1
Videos
- What is Cryptanalysis?
2
Readings
- Lecture Slide - What is Cryptanalysis
- L3: Additional Reference Material
Lesson 4. Modern Guiding Principles
1
Videos
- Modern Guiding Principles in Cryptography
3
Readings
- Lecture Slide - Modern Guiding Principles
- L4: Additional Reference Material
- Video - Cryptography for the masses: Nadim Kobeissi
Module 3 Discussion
1
Assignment
- Practice Assessment - Cryptographic Tidbits
1
Discussions
- What do you think?
Module Assessment
1
Assignment
- Graded Assessment - Cryptographic Tidbits
Lesson 5. Types of Attacks
1
Videos
- Types of Cryptanalytic Attacks
3
Readings
- Lecture Slide - Types of Cryptanalytic Attacks
- Video - Why the NSA is breaking our encryption -- and why we should care | Matthew Green
- L5: Additional Reference Material
Lesson 6. Frequency Analysis of Monoalphabetic Ciphers - Single-Character Frequencies
1
Videos
- Frequency Analysis of Monoalphabetic Ciphers
2
Readings
- Lecture Slide - Frequency Analysis of Monoalphabetic Ciphers - Single-Character Frequencies
- L6: Additional Reference Material
Lesson 7. Frequency Analysis of Monoalphabetic Ciphers - Multi-Character Frequencies
1
Videos
- Multi-Character Frequency Analysis
1
Readings
- Lecture Slide - Multi-Character Frequencies Analysis
Lesson 8. Frequency Analysis for Monoalphabetic Ciphers - Example
1
Videos
- Frequency Analysis of Monoalphabetic Ciphers - Example
2
Readings
- Lecture Slide - Frequency Analysis for Monoalphabetic Ciphers - Example
- L8: Additional Reference Material
Lesson 9. Key Length Determination in Polyalphabetic Ciphers
1
Videos
- Key Length Determination in Polyalphabetic Ciphers
2
Readings
- Lecture Slide - Key Length Determination in Polyalphabetic Ciphers
- L9: Additional Reference Material
Lesson 10. Example of Cracking a Vigenere Cipher
1
Videos
- Example of Cracking a Vigenere Cipher
1
Readings
- Lecture Slide - Example of Cracking a Vigenere Cipher
Module 3 Discussion
1
Assignment
- Practice Assessment - Cryptanalysis
1
Discussions
- What do you think?
Module Assessment
1
Assignment
- Graded Assessment - Cryptanalysis
Lesson 11. What is a Hash Function?
1
Videos
- What is a Hash Function?
2
Readings
- Lecture Slide - What is a Hash Function?
- L11: Additional Reference Material
Lesson 12. How are Cryptographic Hash Functions Used?
1
Videos
- How are Cryptographic Hash Function used
1
Readings
- Lecture Slide - How are Cryptographic Hash Functions Used?
Lesson 13. How are Cryptographic Hash Functions Attacked? Part I
1
Videos
- How are Cryptographic Hash Functions Attacked? Part I
2
Readings
- Lecture Slide - How are Cryptographic Hash Functions Attacked? Part I
- L13: Additional Reference Material
Lesson 14. How are Cryptographic Hash Functions Attacked? Part II
1
Videos
- How are Cryptographic Hash Function Attacked? Part II
2
Readings
- Lecture Slide - How are Cryptographic Hash Function Attacked? Part II
- L14: Additional Reference Material
Lesson 15. What Properties Should a Cryptographic Hash Function Have?
1
Videos
- Properties of a Cryptographic Hash Function
1
Readings
- Lecture Slide - What Properties Should a Cryptographic Hash Function Have?
Module 4 Discussion
1
Assignment
- Practice Assessment - Hash Functions
1
Discussions
- What do you think?
Module Assessment
1
Assignment
- Graded Assessment - Hash Functions
Auto Summary
Explore the fascinating world of cryptography with the "Classical Cryptosystems and Core Concepts" course, designed to fortify your understanding of essential cybersecurity principles. This foundational course, offered by Coursera, delves into fundamental security issues in computer communications and introduces classical cryptographic algorithms. You'll gain insights into symmetric-key and public-key cryptography, authentication, and digital signatures. Led by experts in the field, this comprehensive program spans 720 minutes, providing a thorough grounding in cryptographic concepts and terminology. Ideal for newcomers to cybersecurity, the course requires a basic understanding of computer science and proficiency in algebra and probability. To accommodate different learning needs, the course is available through two subscription options: Starter and Professional. Whether you're looking to build a solid foundation in IT and computer science or aiming to enhance your cybersecurity skill set, this course is tailored for you. Join now and position yourself at the forefront of the rapidly expanding cybersecurity market.

William Bahn

Richard White

Sang-Yoon Chang