About this Course

11,028 recent views

Learner Career Outcomes

50%

got a tangible career benefit from this course
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Intermediate Level
Approx. 16 hours to complete
English

Learner Career Outcomes

50%

got a tangible career benefit from this course
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Intermediate Level
Approx. 16 hours to complete
English

Offered by

Placeholder

University of Colorado System

Syllabus - What you will learn from this course

Week
1

Week 1

4 hours to complete

Basic Cryptography

4 hours to complete
6 videos (Total 50 min), 5 readings, 1 quiz
6 videos
Basic Cryptography10m
Kerckhoff's Principle9m
CryptoAnalysis of Monoalphabetic Substitution Cipher13m
Columnar Transposition Ciphers4m
One-Time Pad & Quantum Key Distribution10m
5 readings
Introduction to cryptology, Part1, from IBM developerWorks30m
What makes a cryptographic protocol strong?30m
Basic Cryptoanalysis. Three Basic Variations of Cryptoanalysis or Cipher Attack:30m
Columnar transposition Ciphers30m
One time pad encryption30m
1 practice exercise
Exam 2.130m
Week
2

Week 2

5 hours to complete

Symmetric Key Cryptography

5 hours to complete
6 videos (Total 55 min), 5 readings, 2 quizzes
6 videos
Advanced Encryption Standard9m
AES Expansion/Schedule4m
AES Selection Criteria13m
Dealing with Block Swapping and Replay Attacks7m
Block Cipher Mode of Operation11m
5 readings
Symmetric Key Encryption and DES15m
AES: The Advanced Encryption Standard by Avi Kak2h
Section 8.8 Key Expansion Algorithm from Prof. Section 8.8 Key Expansion Algorithm Lecture Note15m
Report on the Development of the Advanced Encryption Standard (AES)15m
Block cipher mode of operation15m
1 practice exercise
Exam 2.2. Symmetric Key Algorithm30m
Week
3

Week 3

4 hours to complete

Asymmetric Key Cryptography

4 hours to complete
5 videos (Total 58 min), 5 readings, 2 quizzes
5 videos
Modular Arithmetic13m
Euler Totient Theorem13m
RSA Asymmetric Crypto Algorithm17m
Understanding RSA with OpenSSL6m
5 readings
Diffie-Hellman Key Exchange Protocol20m
Modular Arithemetic20m
Euler's Totient Theorem20m
RSA Cryptosystem10m
OpenSSL Command-Line HOWTO10m
1 practice exercise
Exam 2.3. Asymmetric Key Cryptography30m
Week
4

Week 4

2 hours to complete

Develop Secure Programs with Crypto API

2 hours to complete
3 videos (Total 45 min), 3 readings, 1 quiz
3 videos
Use Crypto API to Sign and Verify9m
Mini Capstone: Enhance Registration Web Site Security20m
3 readings
PHP encrypt and decrypt crypto api20m
PHP Openssl sign and verify API20m
Ashley Madison Case30m
1 practice exercise
Exam 2.4. Develop Secure Programs with Crypto API30m

Reviews

TOP REVIEWS FROM BASIC CRYPTOGRAPHY AND PROGRAMMING WITH CRYPTO API

View all reviews

About the Fundamentals of Computer Network Security Specialization

Fundamentals of Computer Network Security

Frequently Asked Questions

More questions? Visit the Learner Help Center.