About this Specialization

4,977 recent views
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.

100% online courses

Start instantly and learn at your own schedule.

Flexible Schedule

Set and maintain flexible deadlines.

Intermediate Level

Approx. 5 months to complete

Suggested 2 hours/week

English

Subtitles: English

100% online courses

Start instantly and learn at your own schedule.

Flexible Schedule

Set and maintain flexible deadlines.

Intermediate Level

Approx. 5 months to complete

Suggested 2 hours/week

English

Subtitles: English

How the Specialization Works

Take Courses

A Coursera Specialization is a series of courses that helps you master a skill. To begin, enroll in the Specialization directly, or review its courses and choose the one you'd like to start with. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. It’s okay to complete just one course — you can pause your learning or end your subscription at any time. Visit your learner dashboard to track your course enrollments and your progress.

Hands-on Project

Every Specialization includes a hands-on project. You'll need to successfully finish the project(s) to complete the Specialization and earn your certificate. If the Specialization includes a separate course for the hands-on project, you'll need to finish each of the other courses before you can start it.

Earn a Certificate

When you finish every course and complete the hands-on project, you'll earn a Certificate that you can share with prospective employers and your professional network.

how it works

There are 4 Courses in this Specialization

Course1

Course 1

Cryptography and Information Theory

4.4
stars
111 ratings
16 reviews
Course2

Course 2

Symmetric Cryptography

4.5
stars
76 ratings
9 reviews
Course3

Course 3

Asymmetric Cryptography and Key Management

4.5
stars
78 ratings
7 reviews
Course4

Course 4

Cryptographic Hash and Integrity Protection

4.4
stars
29 ratings
3 reviews

Offered by

University of Colorado System logo

University of Colorado System

Frequently Asked Questions

  • Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.

  • This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.

  • The specialization is designed to span across 4 courses and 16-17 weeks with the load being 2-5 hours per week.

  • The learners are recommended to have background in engineering and have a working knowledge of discrete mathematics and probability.

  • It is recommended to follow the order of the courses as specified in this specialization.

  • University of Colorado system plans to give university credit for this specialization, but the discussion is ongoing. This page will get updated when the details are finalized.

  • By the end of this specialization, the learners will be able to apply cryptography to secure networking and systems, design cryptographic protocols and cryptosystems using established primitives, and evaluate the security strength and identify the potential vulnerabilities of existing systems.

More questions? Visit the Learner Help Center.