Macquarie University
Cyber Security: Applied Cryptography
Macquarie University

Cyber Security: Applied Cryptography

本课程是多个项目的一部分。

Matt Bushby

位教师:Matt Bushby

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Understand core cryptographic principles, algorithms, and encryption methods.

  • Apply symmetric and asymmetric encryption to secure data and communications.

  • Explore cryptography in real-world systems like blockchain and VPNs.

  • Evaluate cryptographic risks and implement secure key management practices.

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

June 2025

作业

6 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

积累特定领域的专业知识

此课程作为 的一部分提供
在注册此课程时,您还需要选择一个特定的合作项目。
  • 向行业专家学习新概念
  • 获得对主题或工具的基础理解
  • 通过实践项目培养工作相关技能
  • 获得可共享的职业证书

该课程共有6个模块

Cryptography is the backbone of digital security, powering everything from secure messaging and online banking to digital signatures and blockchain. In this foundational topic, you'll explore the core building blocks of modern cryptography, gaining a solid understanding of the essential principles that make secure communication possible. You’ll learn about key security properties such as confidentiality, integrity, and authenticity, and examine the basic cryptographic functions that support them. The topic also introduces symmetric and asymmetric encryption, as well as the role of Public-Key Infrastructure (PKI) in enabling secure digital trust. By the end of this topic, you’ll be equipped with the fundamental knowledge required to understand and apply cryptographic techniques throughout the rest of the course.

涵盖的内容

1个作业7个插件

In today’s interconnected world, protecting data both at rest and in transit is essential to maintaining trust and operational integrity. This topic focuses on how cryptographic functions are applied to secure information, ensuring that data remains confidential, authentic, and tamper-proof. You’ll explore key concepts such as authenticity and non-repudiation, and learn how to encrypt and decrypt data effectively across various use cases. From securing individual files to implementing full disk encryption, this topic equips you with practical knowledge to apply cryptographic protections in real-world scenarios. By the end, you’ll understand how to use cryptography to enforce strong information security controls, building a critical layer of defence for digital systems and communications.

涵盖的内容

1个作业8个插件

As data moves across networks, ensuring its security is paramount. In this topic, you’ll explore how cryptography underpins the trustworthiness of modern network protocols, and how it is used to secure communications against eavesdropping, tampering, and surveillance. You’ll examine the cryptographic foundations of wired and wireless network protocols, including how encryption secures Wi-Fi, VPNs, and anonymous communication networks like TOR. Additionally, you’ll learn how historical and modern systems demonstrate trust, and how weaknesses in these systems can be exploited through cryptographic attacks. By the end of this topic, you’ll have a deeper understanding of how cryptography defends digital communication, and how to evaluate the security posture of protocols used in today’s networked environments.

涵盖的内容

1个作业8个插件

Cryptography not only protects data, it also safeguards software, digital content, and the hardware environments they run on. In this topic, you’ll explore how cryptographic techniques are used to enforce digital rights, protect intellectual property, and prevent reverse engineering of secure applications. You'll dive into tools and strategies such as copyright enforcement, digital rights management (DRM), and program obfuscation, and understand the importance of robust key management and lifecycle practices. The topic also introduces hardware-based security, including Hardware Security Modules (HSMs) and Trusted Execution Environments (TEEs), and how these platforms enhance cryptographic operations.By the end of this module, you’ll understand how cryptography is applied not just in software, but also in hardware-focused environments, helping organisations protect everything from proprietary algorithms to device-level secrets.

涵盖的内容

1个作业7个插件

Blockchain technology is transforming the way we think about trust, transparency, and decentralisation. In this topic, you’ll explore the cryptographic foundations of blockchain, gaining insight into how blocks are linked, validated, and secured in distributed networks. You’ll learn how blockchain enables cryptocurrencies, and dive into powerful downstream applications such as smart contracts, access control, distributed ledgers, and voting systems, all underpinned by cryptographic integrity and consensus mechanisms. By the end of this topic, you’ll understand not only how blockchains are constructed, but also how they are being leveraged across industries to secure data, automate trust, and decentralise control.

涵盖的内容

1个作业7个插件

As data becomes more valuable and more vulnerable organisations must go beyond traditional encryption to protect sensitive information throughout its entire lifecycle. This topic explores the cutting edge of cryptographic innovation in private and confidential computing, where data remains secure even during processing. You’ll examine how emerging technologies like Homomorphic Encryption, Federated Learning, and Multi-Party Computation (MPC) enable secure operations on encrypted data without ever exposing the underlying information. You'll also learn how to categorise data sensitivity, manage data lifecycles, and prepare for the post-quantum era, where quantum computing threatens to upend current cryptographic standards. By the end of this topic, you’ll have a clear understanding of how advanced cryptography is powering the future of privacy-preserving technologies ensuring that security doesn't come at the cost of usability or innovation.

涵盖的内容

1篇阅读材料1个作业9个插件

获得职业证书

将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。

位教师

Matt Bushby
Macquarie University
15 门课程7,136 名学生

提供方

从 Computer Security and Networks 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题