Lorsque vous vous inscrivez à ce cours, vous êtes également inscrit(e) à cette Spécialisation.
Apprenez de nouveaux concepts auprès d'experts du secteur
Acquérez une compréhension de base d'un sujet ou d'un outil
Développez des compétences professionnelles avec des projets pratiques
Obtenez un certificat professionnel partageable
Il y a 4 modules dans ce cours
Over 10,600 confirmed breaches were reported globally in 2024, exposing millions of records, including sensitive healthcare and financial data. Organizations need cybersecurity professionals who can protect them against this costly risk. This Encryption and Cryptography Essentials course gives aspiring cybersecurity professionals job-ready skills in encryption, hashing, and digital signatures—key competencies employers are looking for.
You’ll master symmetric (AES) and asymmetric (RSA) encryption techniques and apply hashing methods like MD5 and SHA to ensure data integrity. You’ll learn how to manage and verify certificates using the Online Certificate Status Protocol (OCSP). Plus, you’ll explore blockchain technology and its applications.
This course is a comprehensive guide to mastering encryption and cryptography in cybersecurity. Through hands-on labs, interactive quizzes, and projects, you’ll learn how to secure digital information, tackle cybersecurity challenges, and implement encryption and cryptographic solutions.
If you’re looking to add job-ready encryption and cryptography skills employers need to your resume, enroll today!
This module builds a strong foundation in cryptography by explaining its role in securing data and systems. You will classify cryptographic algorithms, understand symmetric and asymmetric encryption, and explore key algorithms such as RSA, ECC, AES, and DES. The module also introduces cryptanalysis and key exchange protocols like Diffie-Hellman and ECDH. Through hands-on labs using OpenSSL, you will apply encryption techniques and understand how secure communication is established in real-world systems.
Afficher les informations sur le contenu du module
7 vidéos•Total 38 minutes
Course Introduction•3 minutes
Introduction to Cryptography•6 minutes
Cryptographic Algorithms and Their Classifications •5 minutes
Introduction to Symmetric and Asymmetric Cryptography •5 minutes
Asymmetric Encryption Algorithms: RSA and ECC •6 minutes
Symmetric Encryption Algorithms: AES and DES •8 minutes
Key Exchange Protocols: Diffie-Hellman and ECDH •5 minutes
9 lectures•Total 81 minutes
Course Overview•3 minutes
Basic Cryptographic Principles •15 minutes
Cryptanalysis and Attacks•10 minutes
Lab: Cryptanalysis•10 minutes
Asymmetric Encryption Algorithms and Its Applications •10 minutes
Symmetric Encryption Algorithms and Its Applications •10 minutes
Key Management in Asymmetric and Symmetric Cryptography•10 minutes
Summary and Highlights: Cryptography Algorithms and Their Classifications •3 minutes
Glossary: Cryptography Algorithms and Their Classifications •10 minutes
3 devoirs•Total 50 minutes
Practice Quiz: Introduction to Cryptography•10 minutes
Practice Quiz: Asymmetric and Symmetric Cryptography •10 minutes
Graded Quiz: Cryptography Algorithms and Their Classifications •30 minutes
3 éléments d'application•Total 90 minutes
Lab: RSA Using OpenSSL •30 minutes
Lab: AES Lab Using OpenSSL •30 minutes
Lab: Diffie-Hellman Using OpenSSL •30 minutes
1 plugin•Total 15 minutes
Helpful Tips for Course Completion•15 minutes
Encryption Techniques and Public Key Infrastructure (PKI)
Module 2•4 heures à terminer
Détails du module
This module focuses on practical encryption techniques and how they are implemented to protect data across systems. You will explore different types of encryption, including full-disk, file, and transport encryption, and understand their real-world applications. The module also introduces Public Key Infrastructure (PKI), including certificate authorities, trust models, and key management. Additionally, you will examine security hardware such as TPM and HSM, along with obfuscation techniques like steganography, with hands-on practice using OpenSSL and CrypTool.
Obfuscation Techniques (Steganography, Tokenization, Data Masking) •4 minutes
6 lectures•Total 60 minutes
Database and Record-Level Encryption •10 minutes
Key Escrow •10 minutes
Certificate Formats and Structures•10 minutes
Key Management Systems and Security Hardware•10 minutes
Summary and Highlights: Encryption Techniques and Public Key Infrastructure •10 minutes
Glossary: Encryption Techniques and Public Key Infrastructure•10 minutes
4 devoirs•Total 60 minutes
Practice Quiz: Encryption Techniques •10 minutes
Practice Quiz: Introduction to Public Key Infrastructure•10 minutes
Practice Quiz: Tools and Techniques •10 minutes
Graded Quiz: Encryption Techniques and Public Key Infrastructure •30 minutes
2 éléments d'application•Total 105 minutes
Lab: PKI Using OpenSSL •60 minutes
Lab: Steganography•45 minutes
Hashing, Digital Signatures, Blockchain and Digital Certificates
Module 3•6 heures à terminer
Détails du module
This module explores advanced cryptographic concepts used to ensure data integrity, authentication, and trust. You will learn how hashing algorithms like MD5 and SHA work and apply them using OpenSSL. The module also covers digital signatures and their role in verification, along with blockchain fundamentals and real-world applications. Additionally, you will examine digital certificates, OCSP, and certificate management practices, gaining practical experience in creating and validating secure identities.
Summary and Highlights: Hashing, Digital Signatures, Blockchain, and Digital Certificates •10 minutes
Glossary: Hashing, Digital Signatures, Blockchain, and Digital Certificates •10 minutes
3 devoirs•Total 50 minutes
Practice Quiz: Hashing, Digital Signatures, and Blockchain •10 minutes
Practice Quiz: Digital Certificates •10 minutes
Graded Quiz: Hashing, Digital Signatures, Blockchain, and Digital Certificates•30 minutes
3 éléments d'application•Total 165 minutes
Lab: Hashing Using OpenSSL •45 minutes
Lab: Digital Signatures Using OpenSSL •60 minutes
Lab: Digital Certificate Using OpenSSL •60 minutes
Final Project and Course Wrap-Up
Module 4•3 heures à terminer
Détails du module
This module consolidates your learning by applying cryptographic concepts in a practical, scenario-based project. You will implement encryption techniques to secure data, ensure authentication, and enable verification in a simulated environment. The module also reinforces key concepts from across the course and prepares you to apply cryptography skills in real-world cybersecurity contexts.
Inclus
1 vidéo3 lectures2 éléments d'application1 plugin
Afficher les informations sur le contenu du module
1 vidéo•Total 3 minutes
Course Wrap-Up •3 minutes
3 lectures•Total 14 minutes
Final Project Overview•10 minutes
Congratulations and Next Steps •2 minutes
Thanks from the Course Team •2 minutes
2 éléments d'application•Total 150 minutes
Final Project Submission: Implementation of Cryptographic Techniques for DataSafe Bank•60 minutes
Final Project: Implementation of Cryptographic Techniques for DataSafe Bank•90 minutes
1 plugin•Total 10 minutes
Reading: Course Glossary •10 minutes
Obtenez un certificat professionnel
Ajoutez ce titre à votre profil LinkedIn, à votre curriculum vitae ou à votre CV. Partagez-le sur les médias sociaux et dans votre évaluation des performances.
Instructeurs
Évaluations de l’enseignant
Évaluations de l’enseignant
Nous avons demandé à tous les étudiants de fournir des commentaires sur nos enseignants au sujet de la qualité de leur pédagogie.
At IBM, we know how rapidly tech evolves and recognize the crucial need for businesses and professionals to build job-ready, hands-on skills quickly. As a market-leading tech innovator, we’re committed to helping you thrive in this dynamic landscape. Through IBM Skills Network, our expertly designed training programs in AI, software development, cybersecurity, data science, business management, and more, provide the essential skills you need to secure your first job, advance your career, or drive business success. Whether you’re upskilling yourself or your team, our courses, Specializations, and Professional Certificates build the technical expertise that ensures you, and your organization, excel in a competitive world.
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?
Felipe M.
Étudiant(e) depuis 2018
’Pouvoir suivre des cours à mon rythme à été une expérience extraordinaire. Je peux apprendre chaque fois que mon emploi du temps me le permet et en fonction de mon humeur.’
Jennifer J.
Étudiant(e) depuis 2020
’J'ai directement appliqué les concepts et les compétences que j'ai appris de mes cours à un nouveau projet passionnant au travail.’
Larry W.
Étudiant(e) depuis 2021
’Lorsque j'ai besoin de cours sur des sujets que mon université ne propose pas, Coursera est l'un des meilleurs endroits où se rendre.’
Chaitanya A.
’Apprendre, ce n'est pas seulement s'améliorer dans son travail : c'est bien plus que cela. Coursera me permet d'apprendre sans limites.’
In this course, you'll learn the fundamentals of encryption, including symmetric and asymmetric encryption algorithms, hashing techniques, digital signatures, and the role of Public Key Infrastructure (PKI). You’ll also explore blockchain technology, cryptographic attacks, and methods for securing data in various real-world applications.
Is prior knowledge of cryptography required?
As this is an intermediate-level course, basic knowledge of cybersecurity, including cybersecurity architecture, is essential.
What practical skills will I gain from this course?
You’ll gain hands-on experience with tools like OpenSSL to generate hashes and digital signatures, as well as apply encryption algorithms in practical scenarios. By the end of the course, you’ll be able to implement cryptographic solutions to secure data, protect communication, and evaluate cryptographic methods.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.