Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Macquarie University

Cyber Security: Applied Cryptography

Macquarie University via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This Cyber Security: Applied Cryptography course equips you with practical skills to apply cryptographic tools and technologies for real-world security challenges. You will gain capabilities to design, evaluate, and apply cryptographic solutions across enterprise and emerging technology contexts. By the end of this course, you will be able to: • Apply foundational cryptographic building blocks, including symmetric/asymmetric encryption and Public-Key Infrastructure (PKI). •Secure data at rest and in motion, using full-disk encryption and ensuring authenticity. • Utilize cryptography in network security protocols, VPNs, wireless systems, and anonymous browsing technologies like TOR. • Protect intellectual property, software integrity, and operate within secure hardware environments such as HSMs and Trusted Execution Environments. • Understand the cryptographic core of blockchain systems for distributed ledgers, smart contracts, and secure voting. • Prepare for future privacy-preserving technologies like Homomorphic Encryption, Federated Learning, Multi-Party Computation, and post-quantum cryptography. This course is for cyber security professionals, software engineers, or tech decision-makers. To be successful, you should have a basic understanding of computer networks and fundamental security concepts.

Syllabus

  • Cryptography Fundamentals
    • Cryptography is the foundation of digital security, powering secure messaging, online banking, digital signatures, and blockchain. This module covers core cryptographic building blocks, providing essential principles for secure communication. You will learn key security properties like confidentiality, integrity, and authenticity, and examine basic cryptographic functions. The module introduces symmetric and asymmetric encryption, plus Public-Key Infrastructure (PKI) for digital trust. To succeed, focus on understanding the foundational concepts, as they build for later modules.
  • Information Security Applications
    • Protecting data at rest and in transit is essential for trust and operational integrity. This module focuses on applying cryptographic functions to secure information, ensuring data remains confidential, authentic, and tamper-proof. You will learn concepts like authenticity and non-repudiation, and how to encrypt and decrypt data across various uses. From securing files to full disk encryption, this module provides practical knowledge for cryptographic protections in real-world scenarios. To succeed, practice applying encryption methods to different data types.
  • Network Security Attacks
    • Securing data across networks is paramount. This module shows how cryptography supports modern network protocols, securing communications against eavesdropping, tampering, and surveillance. You will examine cryptographic foundations of wired and wireless network protocols, including how encryption secures Wi-Fi, VPNs, and anonymous networks like TOR. You will also learn how systems demonstrate trust and how weaknesses lead to cryptographic attacks. To succeed, pay attention to protocol details and attack vectors.
  • Software, Keys and Secure Hardware
    • Cryptography protects data, software, digital content, and hardware environments. This module shows how cryptographic techniques enforce digital rights, protect intellectual property, and prevent reverse engineering of secure applications. You will learn tools and strategies like copyright enforcement, digital rights management (DRM), and program obfuscation. Understand key management and lifecycle practices. The module introduces hardware security, including Hardware Security Modules (HSMs) and Trusted Execution Environments (TEEs), and how these platforms enhance cryptographic operations. To succeed, focus on the interplay between software and hardware security.
  • Blockchain Cryptography
    • Blockchain technology changes how we view trust, transparency, and decentralization. This module covers the cryptographic foundations of blockchain, showing how blocks are linked, validated, and secured in distributed networks. You will learn how blockchain enables cryptocurrencies and applications like smart contracts, access control, distributed ledgers, and voting systems, all supported by cryptographic integrity. To succeed, focus on the cryptographic mechanisms that ensure blockchain security.
  • Private and confidential computing
    • As data becomes more valuable and vulnerable, organizations need more than traditional encryption to protect information throughout its lifecycle. This module covers cryptographic innovation in private and confidential computing, where data stays secure during processing. You will examine emerging technologies like Homomorphic Encryption, Federated Learning, and Multi-Party Computation (MPC) for secure operations on encrypted data. Learn to categorize data sensitivity, manage data lifecycles, and prepare for the post-quantum era. To succeed, consider the implications of these advanced technologies for future data privacy.

Taught by

Matt Bushby

Reviews

Start your review of Cyber Security: Applied Cryptography

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.