YoVDO

Cryptography and Digital Certificates

Offered By: Coventry University via FutureLearn

Tags

Cryptography Courses Symmetric Encryption Courses Asymmetric Encryption Courses Encryption Courses Cloud Security Courses Hash Functions Courses Digital Certificates Courses

Course Description

Overview

Discover how cryptography secures our communication

Explore the core principles of encryption and cryptography and how they can be applied to enhance cyber security models in real-life settings.

You’ll investigate different encryption methods, digital signatures and certificates, and relevant cyber security laws.

Understand hash functions and encryption methods

Discover how hash functions are used to compress a bulk of message length to a short random-looking, fixed-length message digest.

You’ll also study the two key types of encryption, symmetric encryption, and asymmetric encryption.

On this course you’ll unpack the use of digital signatures and certificates as well as other techniques and protocols used for securing communications over a network.

You’ll evaluate different types of attacks on cryptosystems and how to defend against them.

Build your understanding of cyber law

You’ll consider the different types of cybercrime faced by organisations, including cyber-dependent crimes such as hacking and disruption of computer functionality.

You’ll also examine the legal response to cyber crime, including applicable cyber laws and data privacy requirements in the EU.

The course concludes with a look at cloud security issues, studying the emergence of bring your own device policies (BYOD), the emerging trend of employees using their personal devices, and the associated risks.

This course is for anyone who is keen to increase their knowledge of digital security risks and the tools and techniques used to guard against them.

To further your understanding, you may be interested in these courses, from the same provider, that share the same overall learning outcomes:

  • The Cyber Security Landscape
  • Risk Management and Security Vulnerabilities
  • Information Security Policy and Management
  • The Future of Cyber Security and Emerging Technologies

Syllabus

  • Principles of Cryptography
    • Introduction to cryptography
    • Encryptions
    • Digital signatures and certificates
    • Securing communications
    • Crypto system attacks
    • Summary and reflection
  • Cyber law and legal responses to cyber crime
    • Welcome to Week 2 and cyber law
    • Cyber crime
    • The legal response to cyber crime
    • Cloud security
    • Sumary and reflection

Taught by

Chris Whitley

Tags

Related Courses

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
A Cloud Guru
Certified Information Systems Security Professional (CISSP)
A Cloud Guru
CompTIA Security+ Certification Prep
A Cloud Guru
Encryption Fundamentals
A Cloud Guru
LPIC-3 Exam 303: Security
A Cloud Guru