3,545 recent views

#### 100% online

Start instantly and learn at your own schedule.

#### Approx. 9 hours to complete

Suggested: This is Course 1 in a 4-course specialization. Estimated workload: 15-hours per week....

#### English

Subtitles: English

#### 100% online

Start instantly and learn at your own schedule.

#### Approx. 9 hours to complete

Suggested: This is Course 1 in a 4-course specialization. Estimated workload: 15-hours per week....

#### English

Subtitles: English

### Syllabus - What you will learn from this course

Week
1
1 hour to complete

## Specialization Introduction

3 videos (Total 12 min), 2 readings
3 videos
4 hours to complete

## Cryptographic Tidbits

4 videos (Total 55 min), 9 readings, 2 quizzes
4 videos
Modern Guiding Principles in Cryptography12m
Lecture Slide - What is Cryptography?30m
Lecture Slide - Codes and Ciphers10m
Lecture Slide - What is Cryptanalysis10m
Lecture Slide - Modern Guiding Principles10m
Video - Cryptography for the masses: Nadim Kobeissi16m
2 practice exercises
Practice Assessment - Cryptographic Tidbits12m
Week
2
4 hours to complete

## Cryptanalysis

6 videos (Total 62 min), 11 readings, 2 quizzes
6 videos
Frequency Analysis of Monoalphabetic Ciphers - Example11m
Key Length Determination in Polyalphabetic Ciphers11m
Example of Cracking a Vigenere Cipher5m
Lecture Slide - Types of Cryptanalytic Attacks10m
Video - Why the NSA is breaking our encryption -- and why we should care | Matthew Green10m
Lecture Slide - Frequency Analysis of Monoalphabetic Ciphers - Single-Character Frequencies10m
Lecture Slide - Multi-Character Frequencies Analysis10m
Lecture Slide - Frequency Analysis for Monoalphabetic Ciphers - Example10m
Lecture Slide - Key Length Determination in Polyalphabetic Ciphers10m
Lecture Slide - Example of Cracking a Vigenere Cipher10m
2 practice exercises
Practice Assessment - Cryptanalysis28m
Week
3
3 hours to complete

## Hash Functions

5 videos (Total 55 min), 8 readings, 2 quizzes
5 videos
How are Cryptographic Hash Function Attacked? Part II10m
Properties of a Cryptographic Hash Function10m
Lecture Slide - What is a Hash Function?10m
Lecture Slide - How are Cryptographic Hash Functions Used?10m
Lecture Slide - How are Cryptographic Hash Functions Attacked? Part I10m
Lecture Slide - How are Cryptographic Hash Function Attacked? Part II10m
Lecture Slide - What Properties Should a Cryptographic Hash Function Have?10m
2 practice exercises
Practice Assessment - Hash Functions20m
4.6
20 Reviews

## 50%

started a new career after completing these courses

## 50%

got a tangible career benefit from this course

### Top reviews from Classical Cryptosystems and Core Concepts

By MRNov 7th 2017

The lectures were educational, and interesting without speaking down to you. I learned a lot without being overwhelmed

By AGJan 14th 2019

Thank you for taking the time to upload your videos. I hope you create a capstone course.

## Instructors

Lecturer
Computer Science

### Richard White

Assistant Research Professor
Computer Science

### Sang-Yoon Chang

Assistant Professor
Computer Science

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

## About the Introduction to Applied Cryptography Specialization

Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from \$75 billion in 2015 to \$170 billion by 2020. In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience....