Over 10,600 confirmed breaches were reported globally in 2024, exposing millions of records, including sensitive healthcare and financial data. Organizations need cybersecurity professionals who can protect them against this costly risk. This Encryption and Cryptography Essentials course gives aspiring cybersecurity professionals job-ready skills in encryption, hashing, and digital signatures—key competencies employers are looking for.
![IBM](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/bb/f5ced2bdd4437aa79f00eb1bf7fbf0/IBM-Logo-Blk---Square.png?auto=format%2Ccompress&dpr=1&w=28&h=28)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/1a4589dccee10648821b7ea23e5fca9a.png?auto=format%2Ccompress&dpr=1&q=80)
![IBM](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/c0/87a10033a311e892619b85c6fd62bb/IBM-200x48.png?auto=format%2Ccompress&dpr=1&h=45)
Encryption and Cryptography Essentials
Ce cours fait partie de Spécialisation Cybersecurity Fundamentals
![Dr. Manish Kumar](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/dd/203a17884e4c88b91b8c53da9ac167/Profile-Pic.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
![IBM Skills Network Team](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/37/77670911ef45c38688f2987b943f78/SN_200x200_V3.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
Instructeurs : Dr. Manish Kumar
Inclus avec
Expérience recommandée
Ce que vous apprendrez
Job-ready encryption and cryptography skills for cybersecurity employers need in just 4 weeks.
How to classify cryptographic algorithms and key exchange protocols and identify their applications in securing data
How to identify and apply encryption techniques to secure communication and ensure data privacy.
How to use hashing algorithms and digital signatures in blockchain to secure transactions, validate identities, and ensure data integrity.
Détails à connaître
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/31ebcba3851b87d1d8609abf15d0ff7e.png?auto=format%2Ccompress&dpr=1&w=24&h=24)
Ajouter à votre profil LinkedIn
janvier 2025
10 devoirs
Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées
![Emplacement réservé](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/74c8747e8210831049cf88dd4eefe26c.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=320)
Élaborez votre expertise du sujet
- Apprenez de nouveaux concepts auprès d'experts du secteur
- Acquérez une compréhension de base d'un sujet ou d'un outil
- Développez des compétences professionnelles avec des projets pratiques
- Obtenez un certificat professionnel partageable
![Emplacement réservé](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/a7c5400e51272c78b710ce9b56fd3178.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=562)
![Emplacement réservé](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=259)
Obtenez un certificat professionnel
Ajoutez cette qualification à votre profil LinkedIn ou à votre CV
Partagez-le sur les réseaux sociaux et dans votre évaluation de performance
![Emplacement réservé](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=333)
Il y a 4 modules dans ce cours
In this module, you will learn the foundational concepts of cryptography and its essential role in data security. You will classify cryptographic algorithms by their functions. and conduct cryptanalysis using OpenSSL. The module covers asymmetric and symmetric cryptography principles, including RSA and Elliptic Curve Cryptography (ECC), with practical exercises in RSA and AES encryption. Additionally, you will explore key exchange protocols like Diffie-Hellman and The Elliptic Curve Diffie-Hellman (ECDH), culminating in hands-on experience with Diffie-Hellman key exchanges for secure data transmission
Inclus
7 vidéos2 lectures3 devoirs3 éléments d'application8 plugins
In this module, you will identify basic encryption techniques and their applications while recognizing the distinctions among full-disk, partition, file, and volume encryption. You will describe the role of transport encryption and define the principles of Public Key Infrastructure (PKI), including the roles of Certificate Authorities (CAs) and various trust models. Additionally, you will explore the features of the Trusted Platform Module (TPM), Hardware Security Module (HSM), and Secure Enclave for data protection, as well as obfuscation techniques such as steganography, tokenization, and data masking
Inclus
7 vidéos1 lecture4 devoirs2 éléments d'application5 plugins
In this module, you will identify the fundamentals of hashing algorithms, including MD5 and SHA, and apply hashing techniques using OpenSSL to generate secure hashes. You will explain the purpose and importance of digital signatures for data integrity, utilizing OpenSSL to create and verify these signatures. Additionally, you will describe the basics of blockchain technology and its various applications, recognize the role and structure of digital certificates in cybersecurity, and explain the Online Certificate Status Protocol (OCSP) for verifying certificate validity. Finally, you will differentiate between self-signed and third-party certificates in certificate management.
Inclus
7 vidéos1 lecture3 devoirs3 éléments d'application7 plugins
In this module, you will apply the knowledge gained in the course in a final project. You will get to apply the different techniques you have learnt throughout the course in a simulated scenario. The module also wraps up the course learning and highlights key takeaways and next steps.
Inclus
1 vidéo2 lectures2 éléments d'application2 plugins
Offert par
Recommandé si vous êtes intéressé(e) par Security
University of Colorado System
ISC2
University of Colorado System
University of Colorado System
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Felipe_Moitta.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Jennifer_John.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Larry_Tao_Wang_1.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Chaitanya_Anand.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![Emplacement réservé](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/7a1c0e2e779c1ff27cae62480adfe003.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=120)
Ouvrez de nouvelles portes avec Coursera Plus
Accès illimité à 10,000+ cours de niveau international, projets pratiques et programmes de certification prêts à l'emploi - tous inclus dans votre abonnement.
Faites progresser votre carrière avec un diplôme en ligne
Obtenez un diplôme auprès d’universités de renommée mondiale - 100 % en ligne
Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires
Améliorez les compétences de vos employés pour exceller dans l’économie numérique
Foire Aux Questions
In this course, you'll learn the fundamentals of encryption, including symmetric and asymmetric encryption algorithms, hashing techniques, digital signatures, and the role of Public Key Infrastructure (PKI). You’ll also explore blockchain technology, cryptographic attacks, and methods for securing data in various real-world applications.
As this is an intermediate-level course, basic knowledge of cybersecurity, including cybersecurity architecture, is essential.
You’ll gain hands-on experience with tools like OpenSSL to generate hashes and digital signatures, as well as apply encryption algorithms in practical scenarios. By the end of the course, you’ll be able to implement cryptographic solutions to secure data, protect communication, and evaluate cryptographic methods.