About this Specialization
2,442 recent views

100% online courses

Start instantly and learn at your own schedule.

Flexible Schedule

Set and maintain flexible deadlines.

Beginner Level

Approx. 2 months to complete

Suggested 9 hours/week

English

Subtitles: English

Skills you will gain

CryptosystemCryptographic Hash Function (CRHF)Modular Exponentiation
Learners taking this Specialization are
  • Security Engineers
  • Technical Solutions Engineers
  • Machine Learning Engineers
  • Data Scientists
  • Software Engineers

100% online courses

Start instantly and learn at your own schedule.

Flexible Schedule

Set and maintain flexible deadlines.

Beginner Level

Approx. 2 months to complete

Suggested 9 hours/week

English

Subtitles: English

How the Specialization Works

Take Courses

A Coursera Specialization is a series of courses that helps you master a skill. To begin, enroll in the Specialization directly, or review its courses and choose the one you'd like to start with. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. It’s okay to complete just one course — you can pause your learning or end your subscription at any time. Visit your learner dashboard to track your course enrollments and your progress.

Hands-on Project

Every Specialization includes a hands-on project. You'll need to successfully finish the project(s) to complete the Specialization and earn your certificate. If the Specialization includes a separate course for the hands-on project, you'll need to finish each of the other courses before you can start it.

Earn a Certificate

When you finish every course and complete the hands-on project, you'll earn a Certificate that you can share with prospective employers and your professional network.

how it works

There are 4 Courses in this Specialization

Course1

Classical Cryptosystems and Core Concepts

4.6
93 ratings
22 reviews
Course2

Mathematical Foundations for Cryptography

4.7
65 ratings
9 reviews
Course3

Symmetric Cryptography

4.5
58 ratings
7 reviews
Course4

Asymmetric Cryptography and Key Management

4.6
54 ratings
5 reviews

Instructors

Avatar

William Bahn

Lecturer
Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science
Avatar

Sang-Yoon Chang

Assistant Professor
Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Frequently Asked Questions

  • Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.

  • This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.

  • This specialization includes approximately 90 hours of course material, of which about 20 hours is related to project work.

  • While there are no specific prerequisites for this specialization, it does assume some proficiency in logic and mathematics. Similarly, while this is mostly a non-technical course, it does require analytical and problem-solving skills on the part of the learner.

  • Learners are not required to take courses in any particular order, though we recommend the learner complete the courses in ascending numerical sequence.

  • Provided the learner meets minimum satisfactory grade requirements (i.e., 70% on course work & 100% on project work), they may apply for course credit through the University of Colorado at Colorado Springs. Additional costs and requirements may be entailed.

  • This course will provide insight and direction on developing and implementing a coherent cybersecurity program within an organization. The primary benefit of such a program is that will accommodate strategic planning, giving an organization a sense of where it is, where it's going, and how it can get there. It offers a means of managing your destiny.

More questions? Visit the Learner Help Center.