Everyday Cryptography

The importance of cryptography and its role in our everyday lives has never been greater. This course of Everyday Cryptography explains both why and how.

Beginner

181 Lessons

30h

Certificate of Completion

The importance of cryptography and its role in our everyday lives has never been greater. This course of Everyday Cryptography explains both why and how.

AI-POWERED

Explanations

AI-POWERED

Explanations

This course includes

57 Playgrounds
16 Quizzes

This course includes

57 Playgrounds
16 Quizzes

Course Overview

In recent years, the world has witnessed an exponential increase in data. As applications—such as those belonging to financial institutions and governments—become more widespread and the traffic over insecure networks increases, it becomes increasingly important to understand information security principles and techniques. With this goal in mind, “Everyday Cryptography” introduces learners to different aspects of cryptography. The course begins by explaining the key pillars of information security. It intr...Show More

What You'll Learn

An understanding of the fundamental principles of information security

A working knowledge of symmetric (or private key) encryption

A working knowledge of asymmetric (or public key) encryption

Familiarity with techniques for data integrity and authentication

An understanding of key management techniques

Ability to assess the strengths and weaknesses of cryptographic protocols

Introduction to cryptography for personal devices and day-to-day activities

An understanding of potential issues when cryptography and government policy come face to face

What You'll Learn

An understanding of the fundamental principles of information security

See more

Course Content

1

Introduction

2

Basic Principles

3

Historical Cryptosystems

4

Theoretical versus Practical Security

5

Symmetric Encryption

6

Public-Key Encryption

14 Lessons

7

Data Integrity

11 Lessons

8

Digital Signature Schemes

9 Lessons

9

Entity Authentication

8 Lessons

10

Cryptographic Protocols

16 Lessons

11

Key Management

15 Lessons

12

Public-Key Management

10 Lessons

13

Cryptographic Applications

31 Lessons

14

Cryptography for Personal Devices

5 Lessons

15

Control of Cryptography

6 Lessons

16

Mathematics Appendix

6 Lessons

17

Closing Remarks

2 Lessons

Trusted by 1.4 million developers working at companies

Anthony Walker

@_webarchitect_

Emma Bostian 🐞

@EmmaBostian

Evan Dunbar

ML Engineer

Carlos Matias La Borde

Software Developer

Souvik Kundu

Front-end Developer

Vinay Krishnaiah

Software Developer

Eric Downs

Musician/Entrepeneur

Kenan Eyvazov

DevOps Engineer

Anthony Walker

@_webarchitect_

Emma Bostian 🐞

@EmmaBostian

Hands-on Learning Powered by AI

See how Educative uses AI to make your learning more immersive than ever before.

Instant Code Feedback

Evaluate and debug your code with the click of a button. Get real-time feedback on test cases, including time and space complexity of your solutions.

AI-Powered Mock Interviews

Adaptive Learning

Explain with AI

AI Code Mentor

Looking for something else?