This Applied Cryptography offered by Coursera in partnership with University of Colorado System is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields.
Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.
Applied Learning Project
Learners will build the logic and the pseudo-code for the widely used cryptographic primitives and algorithms (as opposed to merely knowing how to use them as black boxes), which will enable them to implement the cryptographic primitives in any platforms/language they choose.
A Coursera Specialization is a series of courses that helps you master a skill. To begin, enroll in the Specialization directly, or review its courses and choose the one you'd like to start with. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. It’s okay to complete just one course — you can pause your learning or end your subscription at any time. Visit your learner dashboard to track your course enrollments and your progress.
Every Specialization includes a hands-on project. You'll need to successfully finish the project(s) to complete the Specialization and earn your certificate. If the Specialization includes a separate course for the hands-on project, you'll need to finish each of the other courses before you can start it.
Earn a Certificate
When you finish every course and complete the hands-on project, you'll earn a Certificate that you can share with prospective employers and your professional network.
Get more detailsVisit official programme website
- Cryptography and Information Theory
- Symmetric Cryptography
- Asymmetric Cryptography and Key Management
- Cryptographic Hash and Integrity Protection
Check out the full curriculumVisit official programme website
- 5 months
- 2 hrs/week
Start dates & application deadlines
DisciplinesComputer Sciences IT Security Cyber Security View 42 other Short Courses in IT Security in United States
Explore more key informationVisit official programme website
We are not aware of any academic requirements for this programme.
We are not aware of any English requirements for this programme.
- Some related experience required.
Make sure you meet all requirementsVisit official programme website
InternationalFreeTuition FeeBased on the tuition of 0 USD for the full programme during 5 months.
NationalFreeTuition FeeBased on the tuition of 0 USD for the full programme during 5 months.
Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project.
Studyportals Tip: Students can search online for independent or external scholarships that can help fund their studies. Check the scholarships to see whether you are eligible to apply. Many scholarships are either merit-based or needs-based.
Double-check all feesVisit official programme website
Apply and win up to €10000 to cover your tuition fees.