Over 10,600 confirmed breaches were reported globally in 2024, exposing millions of records, including sensitive healthcare and financial data. Organizations need cybersecurity professionals who can protect them against this costly risk. This Encryption and Cryptography Essentials course gives aspiring cybersecurity professionals job-ready skills in encryption, hashing, and digital signatures—key competencies employers are looking for.

Encryption and Cryptography Essentials

Encryption and Cryptography Essentials
This course is part of Cybersecurity Fundamentals Specialization


Instructors: Dr. Manish Kumar
Access provided by Chula Engineering
3,472 already enrolled
45 reviews
Recommended experience
What you'll learn
Job-ready encryption and cryptography skills for cybersecurity employers need in just 4 weeks.
How to classify cryptographic algorithms and key exchange protocols and identify their applications in securing data
How to identify and apply encryption techniques to secure communication and ensure data privacy.
How to use hashing algorithms and digital signatures in blockchain to secure transactions, validate identities, and ensure data integrity.
Skills you'll gain
Tools you'll learn
Details to know

Add to your LinkedIn profile
10 assignments
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
This module builds a strong foundation in cryptography by explaining its role in securing data and systems. You will classify cryptographic algorithms, understand symmetric and asymmetric encryption, and explore key algorithms such as RSA, ECC, AES, and DES. The module also introduces cryptanalysis and key exchange protocols like Diffie-Hellman and ECDH. Through hands-on labs using OpenSSL, you will apply encryption techniques and understand how secure communication is established in real-world systems.
What's included
7 videos9 readings3 assignments3 app items1 plugin
This module focuses on practical encryption techniques and how they are implemented to protect data across systems. You will explore different types of encryption, including full-disk, file, and transport encryption, and understand their real-world applications. The module also introduces Public Key Infrastructure (PKI), including certificate authorities, trust models, and key management. Additionally, you will examine security hardware such as TPM and HSM, along with obfuscation techniques like steganography, with hands-on practice using OpenSSL and CrypTool.
What's included
7 videos6 readings4 assignments2 app items
This module explores advanced cryptographic concepts used to ensure data integrity, authentication, and trust. You will learn how hashing algorithms like MD5 and SHA work and apply them using OpenSSL. The module also covers digital signatures and their role in verification, along with blockchain fundamentals and real-world applications. Additionally, you will examine digital certificates, OCSP, and certificate management practices, gaining practical experience in creating and validating secure identities.
What's included
7 videos8 readings3 assignments3 app items
This module consolidates your learning by applying cryptographic concepts in a practical, scenario-based project. You will implement encryption techniques to secure data, ensure authentication, and enable verification in a simulated environment. The module also reinforces key concepts from across the course and prepares you to apply cryptography skills in real-world cybersecurity contexts.
What's included
1 video3 readings2 app items1 plugin
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Explore more from Information Technology

University of Colorado System




