Cryptography is the practice of techniques used to protect the secure transmission of information. This course is an excellent starting point to understand what is cryptography, learn how cryptography is used, and understand hash, symmetric, and asymmetric cryptographic algorithms. You will learn the inner workings of security encryption and cryptographic systems and how to correctly use them in real-world applications through hands-on experience via live virtual machine labs, lab simulations, and case projects.
- Defining Cryptography
- What is Cryptography
- Cryptography and Security
- Cryptographic Algorithms
- Hash Algorithms
- Symmetric Cryptographic Algorithms
- Asymmetric Cryptographic Algorithms
- Using Cryptography
- Encryption through Software
- Hardware Encryption
- Hands-On Projects
- Case Projects
- Lab Simulations
- Live Virtual Machine Lab
- Final Exam
Prerequisites / Requirements
There are no prerequisites to take this course.
- This course can be taken on either a PC or Mac device.
- PC: Windows XP or later.
- Mac: OS X Snow Leopard 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Flash Player. Click here to download the Flash Player.
- Adobe Acrobat Reader. Click here to download the Acrobat Reader.
- Email capabilities and access to a personal email account.
- Software must be installed and fully operational before the course begins.
When can I get started?
You can start this course at any time your schedule permits.
How does it work?
You have three-month access to the course. After enrolling, you can learn and complete the course at your own pace, within the allotted access period.
How long do I have to complete each lesson?
There is no time limit to complete each lesson, other than completing all lessons before your three-month access.
What if I need an extension?
Because this course is self-paced, no extensions will be granted after the start of your enrollment.