About this Course

13,169 recent views

Learner Career Outcomes

50%

started a new career after completing these courses

50%

got a tangible career benefit from this course
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 12 hours to complete
English

Learner Career Outcomes

50%

started a new career after completing these courses

50%

got a tangible career benefit from this course
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 12 hours to complete
English

Offered by

Placeholder

University of Colorado System

Syllabus - What you will learn from this course

Week
1

Week 1

1 hour to complete

Specialization Introduction

1 hour to complete
3 videos (Total 12 min), 2 readings
3 videos
Course Introduction2m
About the Instructor6m
2 readings
About the Course10m
About the Instructor10m
4 hours to complete

Cryptographic Tidbits

4 hours to complete
4 videos (Total 55 min), 9 readings, 2 quizzes
4 videos
Codes and Ciphers15m
What is Cryptanalysis?15m
Modern Guiding Principles in Cryptography12m
9 readings
Lecture Slide - What is Cryptography?30m
Additional Reference Material10m
Lecture Slide - Codes and Ciphers10m
L2: Additional Reference Material10m
Lecture Slide - What is Cryptanalysis10m
L3: Additional Reference Material10m
Lecture Slide - Modern Guiding Principles10m
L4: Additional Reference Material10m
Video - Cryptography for the masses: Nadim Kobeissi16m
2 practice exercises
Practice Assessment - Cryptographic Tidbits30m
Graded Assessment - Cryptographic Tidbits30m
Week
2

Week 2

4 hours to complete

Cryptanalysis

4 hours to complete
6 videos (Total 62 min), 11 readings, 2 quizzes
6 videos
Frequency Analysis of Monoalphabetic Ciphers11m
Multi-Character Frequency Analysis10m
Frequency Analysis of Monoalphabetic Ciphers - Example11m
Key Length Determination in Polyalphabetic Ciphers11m
Example of Cracking a Vigenere Cipher5m
11 readings
Lecture Slide - Types of Cryptanalytic Attacks10m
Video - Why the NSA is breaking our encryption -- and why we should care | Matthew Green10m
L5: Additional Reference Material10m
Lecture Slide - Frequency Analysis of Monoalphabetic Ciphers - Single-Character Frequencies10m
L6: Additional Reference Material10m
Lecture Slide - Multi-Character Frequencies Analysis10m
Lecture Slide - Frequency Analysis for Monoalphabetic Ciphers - Example10m
L8: Additional Reference Material10m
Lecture Slide - Key Length Determination in Polyalphabetic Ciphers10m
L9: Additional Reference Material10m
Lecture Slide - Example of Cracking a Vigenere Cipher10m
2 practice exercises
Practice Assessment - Cryptanalysis30m
Graded Assessment - Cryptanalysis30m
Week
3

Week 3

3 hours to complete

Hash Functions

3 hours to complete
5 videos (Total 55 min), 8 readings, 2 quizzes
5 videos
How are Cryptographic Hash Function used15m
How are Cryptographic Hash Functions Attacked? Part I8m
How are Cryptographic Hash Function Attacked? Part II10m
Properties of a Cryptographic Hash Function10m
8 readings
Lecture Slide - What is a Hash Function?10m
L11: Additional Reference Material10m
Lecture Slide - How are Cryptographic Hash Functions Used?10m
Lecture Slide - How are Cryptographic Hash Functions Attacked? Part I10m
L13: Additional Reference Material10m
Lecture Slide - How are Cryptographic Hash Function Attacked? Part II10m
L14: Additional Reference Material10m
Lecture Slide - What Properties Should a Cryptographic Hash Function Have?10m
2 practice exercises
Practice Assessment - Hash Functions30m
Graded Assessment - Hash Functions30m

Reviews

TOP REVIEWS FROM CLASSICAL CRYPTOSYSTEMS AND CORE CONCEPTS

View all reviews

About the Introduction to Applied Cryptography Specialization

Introduction to Applied Cryptography

Frequently Asked Questions

More questions? Visit the Learner Help Center.