
Overview
This Applied Cryptography Specialization offered by Coursera in partnership with University of Colorado System is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields.
Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.
Applied Learning Project
Learners will build the logic and the pseudo-code for the widely used cryptographic primitives and algorithms (as opposed to merely knowing how to use them as black boxes), which will enable them to implement the cryptographic primitives in any platforms/language they choose.
Take Courses
A Coursera Specialization is a series of courses that helps you master a skill. To begin, enroll in the Specialization directly, or review its courses and choose the one you'd like to start with. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. It’s okay to complete just one course — you can pause your learning or end your subscription at any time. Visit your learner dashboard to track your course enrollments and your progress.
Hands-on Project
Every Specialization includes a hands-on project. You'll need to successfully finish the project(s) to complete the Specialization and earn your certificate. If the Specialization includes a separate course for the hands-on project, you'll need to finish each of the other courses before you can start it.
Earn a Certificate
When you finish every course and complete the hands-on project, you'll earn a Certificate that you can share with prospective employers and your professional network.
Get more details
Visit programme websiteProgramme Structure
Courses included:
- Cryptography and Information Theory
- Symmetric Cryptography
- Asymmetric Cryptography and Key Management
- Cryptographic Hash and Integrity Protection
Check out the full curriculum
Visit programme websiteKey information
Duration
- Part-time
- 1 months
- 10 hrs/week
Start dates & application deadlines
Language
Delivered
Disciplines
Computer Sciences Cyber Security View 705 other Short Courses in Computer Sciences in United StatesExplore more key information
Visit programme websiteWhat students do after studying
Academic requirements
We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.
English requirements
We are not aware of any English requirements for this programme.
Other requirements
General requirements
Intermediate Level
- Some related experience required.
Make sure you meet all requirements
Visit programme websiteTuition Fee
-
International
FreeTuition FeeBased on the tuition of 0 USD for the full programme during 1 months. -
National
FreeTuition FeeBased on the tuition of 0 USD for the full programme during 1 months.
You can choose from hundreds of free courses, or get a degree or certificate at a breakthrough price. You can now select Coursera Plus, an annual subscription that provides unlimited access.
Funding
Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project.