Best Cryptography Courses

Find the best online Cryptography Courses for you. The courses are sorted based on popularity and user ratings. We do not allow paid placements in any of our rankings. We also have a separate page listing only the Free Cryptography Courses.

Bitcoin or How I Learned to Stop Worrying and Love Crypto

The definitive guide to understand what the bitcoin is and why we should care about them.

Created by Charles Hoskinson - Entrepreneur, Mathematician and Cryptocurrency Evangelist

"]

Students: 104669, Price: Free

Students: 104669, Price:  Free

Welcome to the first community built BItcoin course! This course serves as a central point of introduction to Bitcoin for anyone interested. It assumes no special skills or knowledge nor experience in computer science. All are welcome and the course shall forever be free under a creative commons license.

The course is divided into several sections. The Core Lecture Path serves as a comprehensive introduction for beginners on all relevant topics necessary to have a deep understanding of Bitcoin including why Bitcoins have value, why they can be used for anonymous transactions, the current economy of Bitcoins, how they are made and distributed as well as speculation.

The bonus lecture path addresses specific questions students have asked and are not necessary for to satisfy the goals of the course. Feel free to request a bonus lecture at any time! Finally, there are dedicated tracks for more in-depth analysis of the theoretical concepts of Bitcoin alongside the software that makes makes Bitcoin work well.

Bitcoin or How I Learned to Stop Worrying and Love Crypto by Charles Hoskinson is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.

Blockchain Theory 101

Basic description, applications, and implication of blockchain technology

Created by Melanie Swan - Blockchain Theorist, New School University, NYC

"]

Students: 42222, Price: Free

Students: 42222, Price:  Free

Executives, strategists, CTOs, IT professionals, developers and other interested parties will gain an understanding of blockchain technology (including mining, consensus algorithms, smart property, and smart contracts). The current status of blockchain technology, potential applications in Financial Services, Logistics, Healthcare, Energy, and IoT, and next steps regarding its deployment in your organization are discussed.

Cloud Computing: The Technical essentials

Basics you must know before jumping into Cloud Computing

Created by Suresh S - Founder & CEO, CloudSiksha Academy

"]

Students: 26485, Price: Free

Students: 26485, Price:  Free

This course teaches you the technical basics which are required before learning about Cloud Computing. It also gives you an idea of Cloud Computing and the services of cloud computing

The course includes:

Basics of Virtualization, Networking, Data Center, Storage, Cryptography

What is Cloud Computing? 

Deployment Models: Public, Private and Hybrid Clouds

Service Models: IaaS, PaaS and SaaS

A sample public cloud: AWS and the services it offers

Master Mathematical Cryptography 2020: Crack Any Code

Master Every Major Cryptosystem Including RSA, AES & Elliptic Curve Cryptography, & See The Math That Secures Everything

Created by Kody Amour - University Professor - I Teach 50,000 Students In 8 Courses

"]

Students: 21917, Price: $19.99

Students: 21917, Price:  Paid

In this course, you will learn all of the old and modern security systems that have been used and are currently being used. You also learn how to crack each one and understand why certain security systems are weak and why others are strong. We will even go into RSA, AES and ECC which are the three main modern cryptography systems used today. 

Learn How to Crack the Code! 

  • Advanced Encryption Standard

  • Public Key Cryptosystems (ie RSA)

  • Elliptic Curve Cryptography

  • Modern Cryptographic Security

  • Advanced Mathematical Techniques

Master the Art of Security! 

                     Security is a very important tool, and the ability to use mathematics to hide information is vital to the world. See how our banks and even the National Security Agency (NSA) keeps their data secure. With the knowledge of this course, you can even apply for security jobs at places like the NSA! This is a course that is rarely taught in Universities, so take advantage and start today! 

                  Most of today's security is based upon RSA, and AES but the NSA is trying to push Elliptic Curve Cryptography since it is more secure than RSA. In this course, we learn all of these cryptosystems and their weaknesses. We give examples of every cipher that we cover. Only a small number of people currently understand these systems, and you can join them. The best part of this course is the fun in breaking the codes. We offer many examples of each cryptosystem and how to break each one. 

                  Even as you are reading this, your https:// at the top says that the RSA Algorithm is successfully keeping your information from flooding the internet. You can find out how it all works and the mathematical structures that keep it secure in this course. So what are you waiting for? 

ASP.NET Core MVC, Quick and Practical

This is a practical course to learn ASP.NET Core MVC, rapidly and deeply.

Created by Sepehr Esmaeili - Software Developer and Architect

"]

Students: 20285, Price: Free

Students: 20285, Price:  Free

ASP.NET Core MVC is a lightweight, fast and cross-platform framework for building web and cloud applications, built on top of .NET Core framework.

This course is a quick and practical way to learn ASP.NET Core MVC and it aimed to help you start developing your real-world applications in this framework.

By the end of the course you will know how modern web applications are designed and, you have a practical source code with a custom user-management system and authentication to kick start your project.

This course has a progressive approach. It is started by explaining MVC (Model-View-Controller) design pattern and showing how it is implemented in .NET Core and then step by step we will move forward and complete our application while I explain the concepts in a simple language.

During this course besides the primary concepts we will easily learn:

  • Why and how to use services and dependency-injection.
  • How to use configuration files.
  • How to use Entity Framework Core to access and use a currently existing database.
  • And why we should implement our own custom authentication system and how to do it.

SSL/TLS Protocol and Handshake Process

Demystifying SSL/TLS protocol Handshake process

Created by Hack2Secure Training - IT Security Training

"]

Students: 20050, Price: Free

Students: 20050, Price:  Free

In current world, Information is an important asset to everyone. In Business, where information plays a key role in success of any company. Business plans, customer database, product blueprints and road-maps are some of important example of information assets to any organization. At personal level, losing important files, leaked emails, passwords, misuse of Credit cards are some of the examples, which every individual fear of in free flowing world of Internet.

Information security is the collection of technologies, standards, policies and management practices that are applied to information to keep it secure. This course provides overview on some of the basic concepts laying foundation for any secure system.

Under short but precise multiple video lectures, we will talk about some of information security concepts and possible attack scenarios compromising security of the system. Some of the discussed topics are Cryptography, PKI, Digital Certificates, SSL/TLS protocols and many more.

File Encryption Basics and Practices with CrococryptFile

Learn how to use CrococryptFile, learn what file encryption means on the technical level.

Created by Frank Hissen - Computer Scientist / IT security expert

"]

Students: 12682, Price: Free

Students: 12682, Price:  Free

In this course, you
will learn how to use CrococryptFile, the open-source file encryption
solution. Learn what encryption means on the technical level – as a
background information to choose the right file encryption method for
your case. If you care about privacy and if you are willing to do
something about it, you are already on the right track. This applies
for enterprise and private users alike.

First, you will get an
introduction on encryption in general to understand the
characteristics of the different existing technologies. Then, we will
go through the application family step-by-step: Windows, Linux,
Web-based and Command-line interface.

IT background would be
a plus but is not required to take this course.

THIS IS A FOREVER FREE COURSE to support the open-source encryption solution CrococryptFile!

Cryptography Ethical Hacking Course

Learn and Understand ethical hacking using cryptography from scratch.

Created by Shokal Shah - Ethical Hacker and Computer Scientist

"]

Students: 12223, Price: $89.99

Students: 12223, Price:  Paid

Hey there!

I am glad that you have visited the course. I am not going to persuade you to buy this course as i want you to go through the preview and have a glance over introduction to Cryptography, so i you think it is worth, you should go for it. However, i tried my best to explain the course to beginners, but if you are Pro in Cryptography, this course is not for you.

Cryptography seems difficult, but i have explained it in easy manner. So, if you find anything which lacks in this course, feel free to let me know and i would be glad to update this course accordingly.

Blockchain for beginners

Blockchain for beginners

Created by Ashwinkumar Suryavanshi - Software Engineer

"]

Students: 8410, Price: Free

Students: 8410, Price:  Free

"Blockchain for beginners" course is designed for those students who are willing to know more about Blockchain technology and want to start the career in it. It is an attempt to make you aware about Blockchain concepts and its architecture in a very simple and easy to understand way. This course also covers basics of cryptocurrency, bitcoin and bitcoin mining.

Fundamental Question on Cryptography

Multiple Choice Questions (MCQ) on Cryptography

Created by Harish Kumar Maheshwari - Academic Consultant / Electronics Engineer

"]

Students: 7883, Price: $19.99

Students: 7883, Price:  Paid

Dear Learners

Are you Preparing for Interview in Cryptography? Don’t be stressed, take our Cryptography based quiz and prepare yourself for your Interview.

With this Cryptography based Quiz, we are going to build your confidence by providing tips and trick to solve Cryptography based questions. In these Cryptography based Multiple Choice Questions Quiz, there will be a series of practice tests where you can test your Basic Knowledge in Cryptography.

Who should Practice these Cryptography Based Quiz?

  • Anyone wishing to sharpen their knowledge.

  • Anyone preparing for aptitude test.

  • Anyone preparing for interviews.

In these quiz we Covers Following Topics:

  • Classical Encryption Techniques

  • Block Ciphers and the Data Encryption Standard

  • Number Theory and Finite Fields

  • Advanced Encryption Algorithm and Block Cipher Operation

  • Pseudorandom Number Generation and Stream Ciphers

  • Public Key Cryptography and RSA

Cryptography is a science that applies complex mathematics and logic to design strong encryption methods.

Generally, you need to refer a variety of books and Websites in order to cover the ocean of topics in Cryptography. To make it easy for you guys, I have collected a few Cryptography Based questions from different topics, when you solve these Questions then definitely your confidence will Increase.

Without any delay, the applicants participate in the Cryptography Based MCQ Test and understand the various questions and answers.

Best of luck for Quiz

Cryptography Beginners Guide with openSSL

Learn and apply cryptography techniques using openSSL . from symmetric keys and Hash functions to certificates in HTTPS

Created by Ofer Shmueli - Wi-Fi and Security Specialist

"]

Students: 6389, Price: $109.99

Students: 6389, Price:  Paid

OpenSSL and Cryptography - Beginners Guide

A complete Guide

That will walk you through the secrets of:

Encryption, symmetric keys, ciphers, digital signatures using openSSL

What students wrote

Nick Camus

"Great teacher, alive, and communicative."

Atela Dondth

"Ofer is so knowledgeable and experienced. I really enjoyed learning from him."

Lisa Mind

"Awesome course! The instructor really goes indepth on every concept!"

Hana rebic

"I absolutely loved this course. It taught me everything I needed know about cryptography."

Tereza Alex

Thanks for a great and easy to understand course ofer.

Fred Barbosa

I've not done much in the way of cryptography for many years because of the jobs that I've held not requiring it. I've begun exploring and revisiting some things to freshen up my experience and understanding. This was a great way to revisit with good detailed explanations in the step by step clips that were offered. Great for beginners or just an overall refresher.

This course is Hands On. I will  teach you the theory and  the practical usage.

You will understand how HTTPS works with public key cryptography and how to use Hash functions to keep your files integrity safe

WHY openSSL cryptography ?

Cryptography is everywhere, if you are an ethical hacker, Developer, an IT manager or anyone who hangs around with technology, than this is the stuff that you deal with everyday 

In this course you will learn to generate symmetric keys , public keys, certificate request, hash functions and more

You will understand the theoretical concepts of encryption using public and private keys , and use the power of openSSL to apply them

This course is HANDS ON . no power points or fancy words .

WHAT WILL YOU LEARN

  • how encryption works

  • when do we use encryption

  • cipher algorithm operations

  • what are symmetric keys

  • generate and apply symmetric keys on openSSL

  • hash functions

  • when do we use hash functions for integrity and when for confidentiality

  • hash different files on your computers

  • public key cryptography

  • the theory beyond public and private key

  • digital signatures

  • create your own certificate signing request

  • crate your own self sign request

TARGET AUDIENCE

  • Students who have little or no experience in cryptography, and are curious to finally understand the mysterious concepts

  • Anyone who is interested in encryption and hashing techniques , wants to understand and learn how to apply them

  • Ethical hackers, web developers and developers who wants to extend their knowledge on cryptography

Learn Cryptography Basics in Python and Java

Caesar cipher, Vigenere cipher, one time pad, DES, AES, cryptoanalysis, Diffie-Hellman and RSA

Created by Holczer Balazs - Software Engineer

"]

Students: 4532, Price: $119.99

Students: 4532, Price:  Paid

In this course you will learn about cryptography. In this part of the series you will consider most of the private key cryptosystems such as Caesar cipher, Vigenere cipher, Data Encryption Standard (DES) and Advanced Encryption Standard (AES). The cryptosystems are implemented in Python as well as in Java.

Chapter 1:

  • cryptography fundamentals

  • private key and public key cryptosystems

Chapter 2:

  • Caesar cipher theory

  • Caesar cipher implementation

  • how to crack Caesar cipher

  • frequency analysis and language detection

Chapter 3:

  • Vigenere cipher theory and implementation

  • how to crack Vigenere cipher with Kasiski-algorithm

Chapter 4:

  • random and pseudo-random numbers

  • one time pad theory and implementation

  • pseudo-random number generators (middle square method and LCG)

Chapter 5:

  • Data Encryption Standard (DES) theory and implementation

  • cryptoanalysis techniques

Chapter 6:

  • Advanced Encryption Standard (AES) theory and implementation

Chapter 7:

  • symmetric cryptosystems

  • modular arithmetic

Chapter 8:

  • Diffie-Hellman key exchange

  • how to crack the Diffie-Hellman cryptosystem

Chapter 9:

  • RSA cryptosystem

Thanks for joining my course, let's get started!

TOTAL: Conversation on Cryptography: w/ Mike Meyers

Dive into cryptography with The Alpha Geek Mike Meyers and Total Seminars team. Learn cyber security / ethical hacking.

Created by Total Seminars • 750,000+ Enrollments - Home of Mike Meyers and his Team of IT Certification Pros

"]

Students: 3673, Price: $49.99

Students: 3673, Price:  Paid

Hey there! Mike Meyers, your favorite nerd, here to present a fun, casual, and informative conversation on cryptography. I partnered with my good friend, Bill Saichek, to talk about one of my very favorite topics: cryptography. I've loved the idea of cryptic codes, secret agents, and deciphering hidden text since I was a kid. And because I've had so many questions on this topic, I decided to try a different kind of course to help my students understand the more complex concepts in cryptography.

This Conversation on Cryptography course was designed with YOU in mind, whether you're just curious about cryptography (like me), or you took my CompTIA Security+ (SY0-501): The Total Course (or any other cyber security course) and would like a better understanding of this intriguing subject. Here's a rundown of what Bill and I talk about:

  • Caesar and Vigenere ciphers - These fascinating ciphers form part of the basic foundation of cryptography, back before the digital age when militaries, powerful leaders, and spies had to pass messages that couldn't be deciphered if they fell into enemy hands.

  • Binary - In order for ciphers to be useful today, cryptographers had to figure out how to translate them into the language of computers (1s and 0s).

  • Hashing - If all our digital data are just strings of 1s and 0s, how can we make sure we have the real deal? Learn about authentication in this episode.

  • Asymmetric cryptography - We discuss how generating a key pair offers more security, though at the price of taking more time.

  • Symmetric cryptography - This quick and dirty cryptosystem uses a single key to both encrypt and decrypt.

  • Asymmetric methods - Dig into how these methods actually work, and how prime numbers are keeping your data safe. Did we

  • mention we play with paint in this episode?

  • Certificates - The Web is full of hackers who want to take advantage of your personal and private information. So, who do we trust? That's where certificates come in.

  • Public key infrastructure - How do we pass out those certificates? And assure the authenticity of them? PKI to the rescue!

  • Living with certificates - We get our hands on some of those certificates and teach you how to troubleshoot them when something goes wrong.

So sit down, grab a cup of coffee, and join Bill & I for a conversation on cryptography.

Cryptography in Cyber Security with Python

Learn Cryptography in Modern Applications with Implementation in Python, Improve Your Information Security Skills

Created by Ömer Sever - Engineer

"]

Students: 3096, Price: $19.99

Students: 3096, Price:  Paid

You can find basics of cryptography and learn Cryptographic Toolset implemented in Python.

Symmetric and asymmetric algorithms,;

  • AES,

  • Salsa20,

  • RSA,

  • DH,

  • ECDH,

  • ECDSA

Hash Functions:

  • SHA-1,

  • SHA-2,

  • SHA-3

  • MD5

Message Authentication Codes (MAC, HMAC, CMAC)

You can find answers to the questions?

  • Which one to use Block Cipher or Stream Cipher? When and Where?

  • Which Block Cipher to use? Alternatives.

  • Which Mode of Operation to use?

  • What is LFSR?

  • Why we need MAC functions?

Main focus will be cyber security means that you will not be drown in advanced math, our aim is not to be a cryptographer. That is more tied with math subjects like abstract algebra, number theory, finite fields and so on. You will get key principals of cryptography.

Implement security systems efficiently,

Enhance the reliability of the systems you are administering,

Improve your cyber security skills.

Cryptography: Learn Public Key Infrastructure from Scratch

Learn in-depth deployment and configuration of Active Directory Certificate Services (ADCS) a.k.a PKI on Windows Servers

Created by Himanshu Rana - Consultant, Microsoft Certified Trainer

"]

Students: 2578, Price: $24.99

Students: 2578, Price:  Paid

What is this course about?

Do you wonder how SSL works on websites? And what is the significance of digital certificates in secure communication between two entities e.g. a client and a web server? Then you are in the right place.

In this course, we'll talk about PKI which means Public Key Infrastructure. This course provides students with the knowledge and skills to deploy and manage a 2-tier public key infrastructure (PKI) on windows servers to support applications that require certificate based security. Students get hands-on experience implementing the solution to secure websites, applications and devices.

Note: "This course is purely related to Microsoft PKI on windows server a.k.a. Active Directory Certificate Services (ADCS), Please go through the curriculum thoroughly before purchasing the course" 

What kind of materials are used? 

I’ve designed this course using Microsoft Official Curriculum (MOC). Training will be done through videos where you’ll find lectures and hands-on. 

Why take this Course?

There are many reasons to take this course. 

  1. One of the Best courses with more than a 4-star rating on this topic.

  2. This course is designed according to Microsoft Official Curriculum and taught by Microsoft Certified Trainer.

  3. Knowing the understanding level of students whether they are a beginner or advanced, this course is designed for all levels making it the best fit for everyone.

  4. You'll find lots of Hands-On in this course which will make you practically sound.

  5. And moreover, security is a hot subject in today's digital age, so why not learn about one of the major and most popular technique to secure your IT Infrastructure.

  6. At last, I am eager to see you succeed, I am offering you my help, assistance wherever required in learning this course. You can drop your queries in the Q&A section of the course and I'll make sure it will be responded promptly.

30/11/2018

Course updated: Included Lectures on Migrating Hashing Algorithm from SHA1 to SHA2

Master Modern Security and Cryptography by Coding in Python

Master the security of Stream Ciphers, Block Ciphers, Key Exchange, Public Key, Signatures, Shadow files all with Python

Created by Rune Thomsen - Computer Science, PhD/CS, MBA

"]

Students: 1966, Price: $109.99

Students: 1966, Price:  Paid

Security and cryptography is a premise in any application on the internet today. For obvious reasons:

  • You need to protect data that you don't want anyone else to have access to.

  • The internet by itself is open and anyone can eavesdrop your personal information.

  • ...and you need to protect yourself against the possibility of simple breaches.

Why learn Security and Cryptography by programming with Python?

  • Cryptography is understood easiest by trying the mistakes yourself - no complex theory needed.

  • No high-level mathematical skill are needed with this easy approach to learn it.

  • Learn the security principles by programming examples to fully appreciate it.

  • You get to try fun stuff like breaking wrong use of ciphers and cracking your own password from a laptop.

How will you benefit from this course?

  • You will understand security and the principle of cryptography and cryptographic algorithms.

  • Avoid making security mistakes commonly with cryptographic algorithms.

  • Understand the full TLS/SSL stack.

  • Implemented and used One Time Pads, Stream Ciphers, Block Ciphers, Key Exchange, Public Key Encryption, Hash functions, Digital Signatures, HMAC, Shadow files and more.

  • Know how to use crypto-libraries properly without making mistakes.

  • Tried all bigger mistakes in cryptography and security.

  • Crack passwords from Shadow Files

If you want to become a comfortable about encryption and security you need to have some basic understanding of the underlying security concepts. Understanding the main mistakes will enable you to implement and cryptographic algorithms in a correct manner.

In this course we will cover all concepts and security concepts in cryptography to understand the full TLS/SSL protocol stack, how password validation is done and more. You will be learning along the way and implement the encryption and authentication algorithms along the way, making some mistakes to fully appreciate and understand the security flaws.

This course covers the following.

  • The biggest lesson in cryptography is best learned from the ancient Caesar Cipher - a lesson which is counterintuitive and needs a deep understanding to appreciate.

  • Why a large key-space itself does not ensure security is best understood by breaking the Substitution Cipher.

  • The ideal encryption of One Time Pad, the limitations of it, and why it is not ideal in real-life.

  • Stream Ciphers the real life of One Time Pads, why they are used, how easy it is to make mistakes, and how modern day algorithms (e.g. A5/1) did not follow the biggest lesson in cryptography.

  • Block Ciphers like DES, AES, and GOST with different modes of operations.

  • Show by example why Double DES does not add security but we need Triple DES.

  • Understand the challenge of Key Exchange Algorithms (to share a secret key without physical contact) and implement and understand the Diffie-Hellman algorithm.

  • Public Key encryption with RSA. Implement and understand the security of RSA. How wrong usage of RSA breaks it.

  • Hash functions. How to use them for Digital signatures. Password validation in the login process.

  • Understand and implement examples with HMAC.

  • Review that we fully understand TLS/SSL protocols and more.

The course is structures in an easy understandable way

  • It is built to step-by-step from the biggest learnings in classical encryptions.

  • How it was improved but still vulnerable.

  • Understand why ideal encryption systems are not useful and what compromises to take

  • Learn the modern algorithm types in the modern TLS/SSL stack

You code along - you only learn by trying yourself - 40+ coding exercises

  • At each step you make the implementation along with me.

  • You implement it on all stages to increase your understanding of security

  • Basically, we learn along the way with more than 40+ coding exercises.

What is needed to fully understand this course?

  • You have basic understand of Python (see prerequisite for full requirements)

  • Understand basic math from elementary school level.

Who is this course for?

  • You want to learn and understand protocols like TLS/SSL used for secure connections on the internet

  • Want to understand what security is and how systems are vulnerable

  • Those who want to try it with programming examples to fully understand the depth of each lesson

The course has a 30 day money back guarantee that ensures if you are not satisfied, you will get your money back. Also, feel free to contact me directly if you have any questions.

Algorithms for Cryptography

A short course will run you through the a few of most important cryptographic protocols.

Created by Yash Shah - Assistant professor at Vidyalankar Institute Of Technology

"]

Students: 1538, Price: $19.99

Students: 1538, Price:  Paid

Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix "crypt-" means "hidden" or "vault" -- and the suffix "-graphy" stands for "writing." This short course will run you through the a few of most important cryptographic protocols. 

Introduction to Information Security

Information Security and Cryptography

Created by Mariyam Ejaz Maniyar - Academician

"]

Students: 692, Price: Free

Students: 692, Price:  Free

Information Security is not only about securing information from unauthorized access. Information Security is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

Information can be physical or electronic one. Information can be anything like Your details or we can say your profile on social media, your data in mobile phone, your bio-metrics etc. Thus Information Security spans so many research areas like Cryptography, Mobile Computing, Cyber Forensics, Online Social Media etc.

Information Security programs are build around 3 objectives, commonly known as CIA – Confidentiality, Integrity, Availability.

Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix "crypt-" means "hidden" or "vault" -- and the suffix "-graphy" stands for "writing." This short course will run you through few of most important cryptographic protocols.

  1. Confidentiality – means information is not disclosed to unauthorized individuals, entities and process. For example if we say I have a password for my Gmail account but someone saw while I was doing a login into Gmail account. In that case my password has been compromised and Confidentiality has been breached.

  2. Integrity – means maintaining accuracy and completeness of data. This means data cannot be edited in an unauthorized way. For example if an employee leaves an organisation then in that case data for that employee in all departments like accounts, should be updated to reflect status to JOB LEFT so that data is complete and accurate and in addition to this only authorized person should be allowed to edit employee data.

  3. Availability – means information must be available when needed. For example if one needs to access information of a particular employee to check whether employee has outstanded the number of leaves, in that case it requires collaboration from different organizational teams like network operations, development operations, incident response and policy/change management.
    Denial of service attack is one of the factor that can hamper the availability of information.

Encryption and Cryptography for Professionals

The complete guide to encryption and cryptography for developers

Created by Eduonix Learning Solutions - 1+ Million Students Worldwide | 200+ Courses

"]

Students: 585, Price: $49.99

Students: 585, Price:  Paid

Data is the new oil of the 21st century, and guarding this oil has become a headache for many individuals & organizations. Today, people are always looking for various ways to protect their data. One such way is encryption that is a form of cryptography through which you can change information or decode it so that only a particular person can read it.

Everyone is using it- the government is using it to secure classified information, businesses are using it to protect corporate secrets, individuals are using it to guard personal data against any digital theft or piracy.

As of now, it has become one of the most effective forms of data security & still it’s underutilized. As per numerous studies, there has been a steady increase in the deployment of encryption solutions by businesses and organizations over the last few years. This has led to an increase in the fascination of cryptography & fascination. Considering this, we have curated this exclusive course that will teach you every essential concept revolving around Cryptography & Encryption so that you can help others protect businesses.

What Makes This Course So Special?

This course is uniquely curated with all the important concepts required to master Encryption from scratch. It will give you a unique perspective of cryptography, its importance along with some key elements of encryption.

This course unfolds with all the fundamentals by introducing you to the cryptography, information theory & building blocks of encryption. Once the basic is covered, the instructor will give you insights into symmetric encryption algorithms for data transfer & data storage, & then help you understand public-key cryptography.

You will also learn other essential concepts such as hash functions, hash algorithms, & so on. Lastly, to make you confident in encryption, we have also included some more advanced concepts such as Secure Multi-Party Computation, Zero-Knowledge Proofs, Ring Signatures, Post-Quantum Cryptography & others.

This Course Includes-

1. Fundamentals of cryptography

2. Symmetric key cryptography- algorithms, security for bulk data transfer & data storage

3. Public key cryptography- introduction, ‘hard’ problems, asymmetric algorithms, public key infrastructure, cryptography for key sharing

4. Hash functions- Introduction, security assumptions, algorithms, hash functions for password security & data integrity

5. Advanced concepts- secure multi-party computation, zero-knowledge proofs, ring signatures, post-quantum cryptography, homomorphic encryption

Explore the world of encryption to save various businesses from data theft- Start today!

Elliptic Curve Cryptography Masterclass From Scratch

Learn fundamentals of public key cryptosystem which empowers bitcoin and blockchain. Hands on experience from scratch

Created by Sefik Ilkin Serengil - Software Engineer

"]

Students: 533, Price: $89.99

Students: 533, Price:  Paid

Elliptic curve cryptography is the most advanced cryptosystem in the modern cryptography world. It lies behind the most of encryption, key exchange and digital signature applications today. It guarantees same security with other public key algorithms such as RSA or Diffie Hellman whereas it can handle the security with smaller keys also in faster way. Today, even bitcoin and other blockchain based cryptocurrencies are based on ECC!

In this course, we will mention on both the math behind elliptic curve cryptography and gain hands on experience in Java and also Python. In other words, the course covers both theory and practice deeply. On the other hand, everything will be developed from scratch. Also, no out-of-the-box of feature of any language will be used. Elliptic curves in Weierstrass, Koblitz and Edwards form (or shortly Edwards Curves) will be covered.

Finally, you can have your own elliptic curve cryptography API when you enrolled the course, and no need to consume any other 3rd party dependency.

Advanced Cryptography Concepts

Advanced Cryptography Concepts, Basic and Advanced Encryption Concepts, PKI Components, Encryption Systems

Created by Dr. Dwayne Hodges - Certified Proffessor at UDEMY

"]

Students: 255, Price: $39.99

Students: 255, Price:  Paid

Advanced Advance Cryptography Concepts, deep dive explanation into to the advantages, disadvantages, use case, constraints, limitations of symmetric, asymmetric, Hashing, algorithms, Public Key Infrastructure, Certificate Authority, Secure Channels, TLS, and standards. Course covers through explains of Applications of Cryptography, Private and public key pairs, and Binary math, the good bad and ugly for all symmetric and asymmetric algorithms with practical use cases for how algorithms are uses today and how their weakness are discovered and broke, such as with WEP and DES. Cryptographic Secure Channels and cybersecurity defense counter measures, Cryptanalysis attacks, Cryptography standards, to include VPS, IPSEC, AH, ESP, and major attacks against crypto systems.

This Course covers all major systemic and asymmetric algorithms and the entire encryption system with the application of the CIA triad to cryptography to include a discussion on how Blockchain works as a security solution. Course resources included with all videos.   

Course is broken down in 5 areas with over 13 symmetric algorithms

Symmetric

· Substitution

· Transposition

· Major concepts and definitions

· Keys

· Advantages and disadvantages of symmetric

· Binary Math

· Key Management

· DES Operations

· DES Modes

· AES Operations

Asymmetric

· Private and public key pair- deep dive

· Algorithms – deep dive

· Advantages and disadvantages of symmetric

· Authenticity

· Non-Repudiation

· Application of asymmetric

· Key agreement and key exchange

· Digital Signature

· TLS Secure channel

Hashing Algorithms

· Hash algorithms and concepts

· Integrity

· Birthday attack

· Collisions

· Application with PKI

· HMAC

· Demo

PKI

· Certificate Authorities (CA)

· Certificate Management

· Public Key Generation

· Public Key Distribution

· X509v3

· Certificate classes

· Registration Authorities

· Certificate Policy Statement

· CRL

· OCSP

· Certificate Pinning

· Certificate Revocation

· Trust Models

· Certificate Life Cycle

Cryptography Standards and Agencies

  • NIST

    • NIST SP 

  • NSA

    • SUITE A and B Algorithms

    • Types

  • RFC

  • PKCS

  • FIPS

  • CNSS

  • IETF

  • PKI

  • Key Management 

Cryptography beginners guide with openssl – Part 2

Learn Encryption The Fun way with OpenSSL

Created by Ofer Shmueli - Wi-Fi and Security Specialist

"]

Students: 222, Price: $89.99

Students: 222, Price:  Paid

This Course Focus is on Symmetric Encryption  and hash functions ,we will understand the inner parts, while still making the learning curve fun and simple

We will look at secret key generation, how do we generate keys , it is much more complex than you thought

it involves   permutations of the bit stream , swapping bits , shifting, substitution them and finally doing the XOR bitwise operation

You will learn the basic of modern encryption operations

We will dive into  block ciphers mode of operation , how algorithms join the block ciphers together and send them along , a key concept of every symmetric encryption

And then we will learn of hash functions

hash functions are calculated to keep our messages intact .

how do we keep the integrity and authenticity of our files using salted hash and MAC's- Message Authentication Codes and hmacs , a cryptographic hash functions

What students wrote about "Cryptography For Beginners - Part 1

Nick Camus

"Great teacher, alive, and communicative."

Atela Dondth

"Ofer is so knowledgeable and experienced. I really enjoyed learning from him."

Lisa Mind

"Awesome course! The instructor really goes indepth on every concept!"

Hana rebic

"I absolutely loved this course. It taught me everything I needed know about cryptography."

Tereza Alex

Thanks for a great and easy to understand course ofer.

Fred Barbosa

I've not done much in the way of cryptography for many years because of the jobs that I've held not requiring it. I've begun exploring and revisiting some things to freshen up my experience and understanding. This was a great way to revisit with good detailed explanations in the step by step clips that were offered. Great for beginners or just an overall refresher.

This course is Hands On. I will  teach you the theory and  the practical usage.

So come along , Cryptography is Fun

Cyberhacker Series: Cryptography for Hackers

Cyberhacker Series: Cryptography for Hackers

Created by Chad Russell - Join the Cyber Security Industry!

"]

Students: 195, Price: $89.99

Students: 195, Price:  Paid

Cyberhacker Series:  Cryptography for Hackers

This course is for beginners and IT pros looking to learn more about cryptography     Each chapter closes with exercises putting your new learned skills into practical use immediately.  

What are the pre-requisites for this course?

  1. Students should have a working understanding of TCP/IP and networking concepts. 

What will you be able to do after taking this course?

  • TLS - Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols that provide communications security over a computer network.

  • IPSec - Internet Protocol Security (IPsec) is a network protocol suite that authenticates and encrypts the packets of data sent over a network. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to use during the session. IPsec can protect data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host). Internet Protocol security (IPsec) uses cryptographic security services to protect communications over Internet Protocol (IP) networks. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection.

  • PKI - A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

  • Web Encoding - URL Encoding (Percent Encoding) URLs can only be sent over the Internet using the ASCII character-set. Since URLs often contain characters outside the ASCII set, the URL has to be converted into a valid ASCII format. URL encoding replaces unsafe ASCII characters with a "%" followed by two hexadecimal digits.

  • Symmetric Crypto - Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple transformation to go between the two keys.

  • Asymmetric Crypto -    Asymmetric Encryption is a form of Encryption where keys come in pairs. ... Frequently (but not necessarily), the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it.

Hands-On Cryptography with Java

Learn enough cryptography to solve problems without a math background

Created by Packt Publishing - Tech Knowledge in Motion

"]

Students: 170, Price: $89.99

Students: 170, Price:  Paid

Security is paramount for any application. Cryptography occurs all across software fields: it protects all HTTPS traffic between browsers, encrypts phone storage against prying eyes, and can even hide files inside other files through a technique called steganography. This course is for developers looking to design a system that uses cryptography, rather than designing new algorithms. Most developers simply need to put the right pieces together to make their own system work.

In this course, you will break down the concepts behind cryptography into simple lessons, covering terminology, algorithms, standards, and encryption/decryption techniques. We will also walk through how cryptographic systems are hacked to bypass (rather than break) their cryptographic capabilities. 

The course answers questions such as:

  • What is cryptography used for?

  • What are keys and where do they go?

  • Why do networked systems sometimes give certificate validation errors?

  • If I need to encrypt something, how should I do that?

By the end of this course, you will recognize cryptographic problems and understand the right knowledge to apply a verifiable solution.

About the Author

Erik Costlow ran Oracle’s Java Root Certificate program, coordinating efforts with many cryptographic organizations. He is an experienced software security expert focused on program analysis and runtime instrumentation to detect security issues and provide useful guidance on fixing any security issues.

Cryptography Basics From Scratch in Python

Learn cryptography basics including encryption, decryption and cryptoanalysis from scratch in Python

Created by Sefik Ilkin Serengil - Software Engineer

"]

Students: 153, Price: $89.99

Students: 153, Price:  Paid

This is a hands-on cryptography course covering encryption, decryption and cryptoanalysis approaches for historical and classical methods. The most common cryptographic approaches will be mentioned such as shift ciphers, substitution ciphers, permutation ciphers and block ciphers. Everything will be developed from scratch in Python. This course will guide you to see and understand how the most advanced cryptography algorithms derived from these historical algorithm in time.

Cryptography – Past, Present and Future

An overview of cryptography from the past, to the current methods, and the potential for the future

Created by Steve Lakin - Mathematician

"]

Students: 129, Price: $29.99

Students: 129, Price:  Paid

This course is intended to provide an overview of cryptography. We will take a tour through history, looking at the earliest ciphers, through the secret-key methods that took over, through to current methods such as public-key methods, and also look at the future possibilities as the next step. The course consists of a series of short lectures on slides - many have supplementary notes and questions to attempt, with fully-worked solutions provided. The course is intended to be informative but also enjoyable - my aim is that you learn something about cryptography, but also enjoy it and are motivated to find out more!

Number Theory and Cryptography

A first course

Created by Mohamed Atouani - Professor of Mathematics

"]

Students: 125, Price: $89.99

Students: 125, Price:  Paid

This is an introductory undergraduate level course of number theory and cryptography. Roughly speaking, on the one hand, number theory is the mathematical branch that studies relations between integers. On the other hand, cryptography is the science of concealing messages and is one very active domain nowadays. All you need here is high school algebra and scientific maturity. Enjoy!

CompTIA Security+ Certification(SY0-501): Cryptography

Everything you need to know about Cryptography to best prepare for your CompTIA Security+ Certification Exam

Created by John Wiley & Sons - Video Training

"]

Students: 52, Price: $49.99

Students: 52, Price:  Paid

Composed from Sybex's best review materials, this course is all you need to help you master one of the topics covered in CompTIA Security+ (SY0-501) exam.

Whether if you are someone who is looking for the 'last minute review' or someone who is looking for an introduction to a topic, this course is perfect for you!

Our bite-sized lessons make it easy for the users to grasp the material quickly.

Exam Objectives covered in this course:

  • 1.2: Compare and contrast types of attacks

  • 6.1: Compare and contrast basic concepts of cryptography

  • 6.2: Explain cryptography algorithms and their basic characteristics

  • 6.3: Given a scenario, install and configure wireless security settings

  • 6.4: Given a scenario, implement public key infrastructure

Topics Included in the course: