Macquarie University

Cyber Security: Applied Cryptography

Macquarie University

Cyber Security: Applied Cryptography

本课程是多个项目的一部分。

Matt Bushby

位教师:Matt Bushby

访问权限由 Coursera Learning Team 提供

深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Explain core cryptographic principles, algorithms, and encryption methods.

  • Secure data and communications using symmetric and asymmetric encryption.

  • Apply cryptography in real-world systems like blockchain and VPNs

  • Evaluate cryptographic risks and implement secure key management.

要了解的详细信息

可分享的证书

添加到您的领英档案

作业

6 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

积累特定领域的专业知识

此课程作为 的一部分提供
在注册此课程时,您还需要选择一个特定的合作项目。
  • 向行业专家学习新概念
  • 获得对主题或工具的基础理解
  • 通过实践项目培养工作相关技能
  • 获得可共享的职业证书

该课程共有6个模块

Cryptography is the foundation of digital security, powering secure messaging, online banking, digital signatures, and blockchain. This module covers core cryptographic building blocks, providing essential principles for secure communication. You will learn key security properties like confidentiality, integrity, and authenticity, and examine basic cryptographic functions. The module introduces symmetric and asymmetric encryption, plus Public-Key Infrastructure (PKI) for digital trust. To succeed, focus on understanding the foundational concepts, as they build for later modules.

涵盖的内容

1个作业7个插件

Protecting data at rest and in transit is essential for trust and operational integrity. This module focuses on applying cryptographic functions to secure information, ensuring data remains confidential, authentic, and tamper-proof. You will learn concepts like authenticity and non-repudiation, and how to encrypt and decrypt data across various uses. From securing files to full disk encryption, this module provides practical knowledge for cryptographic protections in real-world scenarios. To succeed, practice applying encryption methods to different data types.

涵盖的内容

1个作业8个插件

Securing data across networks is paramount. This module shows how cryptography supports modern network protocols, securing communications against eavesdropping, tampering, and surveillance. You will examine cryptographic foundations of wired and wireless network protocols, including how encryption secures Wi-Fi, VPNs, and anonymous networks like TOR. You will also learn how systems demonstrate trust and how weaknesses lead to cryptographic attacks. To succeed, pay attention to protocol details and attack vectors.

涵盖的内容

1个作业7个插件

Cryptography protects data, software, digital content, and hardware environments. This module shows how cryptographic techniques enforce digital rights, protect intellectual property, and prevent reverse engineering of secure applications. You will learn tools and strategies like copyright enforcement, digital rights management (DRM), and program obfuscation. Understand key management and lifecycle practices. The module introduces hardware security, including Hardware Security Modules (HSMs) and Trusted Execution Environments (TEEs), and how these platforms enhance cryptographic operations. To succeed, focus on the interplay between software and hardware security.

涵盖的内容

1个作业7个插件

Blockchain technology changes how we view trust, transparency, and decentralization. This module covers the cryptographic foundations of blockchain, showing how blocks are linked, validated, and secured in distributed networks. You will learn how blockchain enables cryptocurrencies and applications like smart contracts, access control, distributed ledgers, and voting systems, all supported by cryptographic integrity. To succeed, focus on the cryptographic mechanisms that ensure blockchain security.

涵盖的内容

1个作业6个插件

As data becomes more valuable and vulnerable, organizations need more than traditional encryption to protect information throughout its lifecycle. This module covers cryptographic innovation in private and confidential computing, where data stays secure during processing. You will examine emerging technologies like Homomorphic Encryption, Federated Learning, and Multi-Party Computation (MPC) for secure operations on encrypted data. Learn to categorize data sensitivity, manage data lifecycles, and prepare for the post-quantum era. To succeed, consider the implications of these advanced technologies for future data privacy.

涵盖的内容

1篇阅读材料1个作业9个插件

获得职业证书

将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。

位教师

Matt Bushby
Macquarie University
15 门课程 15,676 名学生

提供方

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'

从 Computer Science 浏览更多内容