This course covers cloud security and cryptographic practices. You will explore the dynamic world of cloud computing, gaining insights into common vulnerabilities, security assessment techniques, and strategies for safeguarding cloud-based assets. You will learn about cryptography, including encryption algorithms, cryptanalysis, and the critical role of cryptography in securing data both at rest and in transit. You will learn about the intersection of cloud computing and cryptography, including encryption methods used in cloud environments and emerging post-quantum cryptography algorithms. By the end of this course, you will be proficient in implementing security measures in cloud and cryptographic contexts.



Certified Ethical Hacker (CEH): Unit 7
This course is part of Certified Ethical Hacker (CEH) Specialization

Instructor: Pearson
Included with
Recommended experience
What you'll learn
Identify and mitigate vulnerabilities in cloud environments.
Implement cryptographic techniques for secure data storage and transmission.
Understand and apply post-quantum cryptography algorithms.
Develop secure cloud applications using DevSecOps best practices.
Skills you'll gain
Details to know

Add to your LinkedIn profile
July 2025
2 assignments
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There is 1 module in this course
This module covers cloud computing and cryptography. These technologies are fundamentals in how we store, process, and protect data. The cloud has changed how businesses and individuals store and access data, and run applications. You will learn about common vulnerabilities in cloud environments, techniques for assessing cloud security, and strategies for securing cloud-based assets. You will also learn about how cloud computing and cryptography (the art and science of securing communications and data) intersect in data encryption, and about methods used to encrypt data in transit. You will also be introduced to the new post-quantum cryptography algorithms.
What's included
21 videos2 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Explore more from Security
- Status: Free Trial
- Status: Free Trial
- Status: Free Trial
Illinois Tech
- Status: Preview
Illinois Tech
Why people choose Coursera for their career





Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
More questions
Financial aid available,