About this Course

35,109 recent views

Learner Career Outcomes

20%

got a tangible career benefit from this course

Shareable Certificate

Earn a Certificate upon completion

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 8 hours to complete

English

Subtitles: English

Learner Career Outcomes

20%

got a tangible career benefit from this course

Shareable Certificate

Earn a Certificate upon completion

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 8 hours to complete

English

Subtitles: English

Offered by

University of Colorado System logo

University of Colorado System

Syllabus - What you will learn from this course

Week
1

Week 1

2 hours to complete

Cryptography Overview

2 hours to complete
8 videos (Total 19 min), 1 reading, 2 quizzes
8 videos
Module Objectives1m
Alice, Bob, and Eve1m
Cryptography Terminology2m
Threat Model and the Attacker Knowledge1m
Kerckhoff's Principle3m
Security by Obscurity and Steganography, Part 12m
Security by Obscurity and Steganography, Part 21m
1 reading
Slides for Cryptography Overview20m
1 practice exercise
Kerckhoff's Principle and Security by Obscurity30m
Week
2

Week 2

2 hours to complete

Information Entropy

2 hours to complete
6 videos (Total 44 min), 1 reading, 2 quizzes
6 videos
Deterministic vs. Random4m
Information Entropy5m
Entropy: Uniform Distribution Case9m
Entropy: General Distribution Case13m
Entropy Recap9m
1 reading
Slides for Information Entropy20m
2 practice exercises
Throwing a Dice15m
Entropy: Balls in a Bin35m
Week
3

Week 3

1 hour to complete

Brute-Force Attack and Cryptanalysis

1 hour to complete
4 videos (Total 13 min), 1 reading, 1 quiz
4 videos
Brute Force Attack3m
Cryptanalysis5m
Perfect Secrecy and One-Time Pad3m
1 reading
Lecture Slides for Brute Force and Cryptanalysis20m
1 practice exercise
Brute-Force Attack, Cryptanalysis, and One-Time Pad30m
Week
4

Week 4

2 hours to complete

Computational Security and Side-Channel Attack

2 hours to complete
3 videos (Total 12 min), 2 readings
3 videos
Computational Security: Attacker's Computational Bound6m
Side-Channel Attack4m
2 readings
Lecture Slides for Computational Security and Side Channel Attacks20m
Reading on physical side-channel attacks1h 10m

About the Applied Cryptography Specialization

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols....
Applied Cryptography

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

  • If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.

  • Yes, Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project. Learn more.

More questions? Visit the Learner Help Center.