Macquarie University

Cyber Security: Applied Cryptography

Macquarie University

Cyber Security: Applied Cryptography

This course is part of multiple programs.

Matt Bushby

Instructor: Matt Bushby

Access provided by US Postal Service

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Explain core cryptographic principles, algorithms, and encryption methods.

  • Secure data and communications using symmetric and asymmetric encryption.

  • Apply cryptography in real-world systems like blockchain and VPNs

  • Evaluate cryptographic risks and implement secure key management.

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

6 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is available as part of
When you enroll in this course, you'll also be asked to select a specific program.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 6 modules in this course

Cryptography is the foundation of digital security, powering secure messaging, online banking, digital signatures, and blockchain. This module covers core cryptographic building blocks, providing essential principles for secure communication. You will learn key security properties like confidentiality, integrity, and authenticity, and examine basic cryptographic functions. The module introduces symmetric and asymmetric encryption, plus Public-Key Infrastructure (PKI) for digital trust. To succeed, focus on understanding the foundational concepts, as they build for later modules.

What's included

1 assignment7 plugins

Protecting data at rest and in transit is essential for trust and operational integrity. This module focuses on applying cryptographic functions to secure information, ensuring data remains confidential, authentic, and tamper-proof. You will learn concepts like authenticity and non-repudiation, and how to encrypt and decrypt data across various uses. From securing files to full disk encryption, this module provides practical knowledge for cryptographic protections in real-world scenarios. To succeed, practice applying encryption methods to different data types.

What's included

1 assignment8 plugins

Securing data across networks is paramount. This module shows how cryptography supports modern network protocols, securing communications against eavesdropping, tampering, and surveillance. You will examine cryptographic foundations of wired and wireless network protocols, including how encryption secures Wi-Fi, VPNs, and anonymous networks like TOR. You will also learn how systems demonstrate trust and how weaknesses lead to cryptographic attacks. To succeed, pay attention to protocol details and attack vectors.

What's included

1 assignment7 plugins

Cryptography protects data, software, digital content, and hardware environments. This module shows how cryptographic techniques enforce digital rights, protect intellectual property, and prevent reverse engineering of secure applications. You will learn tools and strategies like copyright enforcement, digital rights management (DRM), and program obfuscation. Understand key management and lifecycle practices. The module introduces hardware security, including Hardware Security Modules (HSMs) and Trusted Execution Environments (TEEs), and how these platforms enhance cryptographic operations. To succeed, focus on the interplay between software and hardware security.

What's included

1 assignment7 plugins

Blockchain technology changes how we view trust, transparency, and decentralization. This module covers the cryptographic foundations of blockchain, showing how blocks are linked, validated, and secured in distributed networks. You will learn how blockchain enables cryptocurrencies and applications like smart contracts, access control, distributed ledgers, and voting systems, all supported by cryptographic integrity. To succeed, focus on the cryptographic mechanisms that ensure blockchain security.

What's included

1 assignment6 plugins

As data becomes more valuable and vulnerable, organizations need more than traditional encryption to protect information throughout its lifecycle. This module covers cryptographic innovation in private and confidential computing, where data stays secure during processing. You will examine emerging technologies like Homomorphic Encryption, Federated Learning, and Multi-Party Computation (MPC) for secure operations on encrypted data. Learn to categorize data sensitivity, manage data lifecycles, and prepare for the post-quantum era. To succeed, consider the implications of these advanced technologies for future data privacy.

What's included

1 reading1 assignment9 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
15 Courses 14,618 learners

Offered by

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Explore more from Computer Science