IBM
Encryption and Cryptography Essentials

New year. Big goals. Bigger savings. Unlock a year of unlimited access to learning with Coursera Plus for $199. Save now.

IBM

Encryption and Cryptography Essentials

Dr. Manish Kumar
IBM Skills Network Team

Instructors: Dr. Manish Kumar

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

15 hours to complete
3 weeks at 5 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

15 hours to complete
3 weeks at 5 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Job-ready encryption and cryptography skills for cybersecurity employers need in just 4 weeks.

  • How to classify cryptographic algorithms and key exchange protocols and identify their applications in securing data 

  • How to identify and apply encryption techniques to secure communication and ensure data privacy. 

  • How to use hashing algorithms and digital signatures in blockchain to secure transactions, validate identities, and ensure data integrity.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

January 2025

Assessments

10 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the Cybersecurity Fundamentals Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 4 modules in this course

In this module, you will learn the foundational concepts of cryptography and its essential role in data security. You will classify cryptographic algorithms by their functions. and conduct cryptanalysis using OpenSSL. The module covers asymmetric and symmetric cryptography principles, including RSA and Elliptic Curve Cryptography (ECC), with practical exercises in RSA and AES encryption. Additionally, you will explore key exchange protocols like Diffie-Hellman and The Elliptic Curve Diffie-Hellman (ECDH), culminating in hands-on experience with Diffie-Hellman key exchanges for secure data transmission

What's included

7 videos2 readings3 assignments3 app items8 plugins

In this module, you will identify basic encryption techniques and their applications while recognizing the distinctions among full-disk, partition, file, and volume encryption. You will describe the role of transport encryption and define the principles of Public Key Infrastructure (PKI), including the roles of Certificate Authorities (CAs) and various trust models. Additionally, you will explore the features of the Trusted Platform Module (TPM), Hardware Security Module (HSM), and Secure Enclave for data protection, as well as obfuscation techniques such as steganography, tokenization, and data masking

What's included

7 videos1 reading4 assignments2 app items5 plugins

In this module, you will identify the fundamentals of hashing algorithms, including MD5 and SHA, and apply hashing techniques using OpenSSL to generate secure hashes. You will explain the purpose and importance of digital signatures for data integrity, utilizing OpenSSL to create and verify these signatures. Additionally, you will describe the basics of blockchain technology and its various applications, recognize the role and structure of digital certificates in cybersecurity, and explain the Online Certificate Status Protocol (OCSP) for verifying certificate validity. Finally, you will differentiate between self-signed and third-party certificates in certificate management.

What's included

7 videos1 reading3 assignments3 app items7 plugins

In this module, you will apply the knowledge gained in the course in a final project. You will get to apply the different techniques you have learnt throughout the course in a simulated scenario. The module also wraps up the course learning and highlights key takeaways and next steps.

What's included

1 video2 readings1 peer review1 app item2 plugins

Instructors

Dr. Manish Kumar
IBM
7 Courses151,991 learners

Offered by

IBM

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions