Macquarie University
Applied Cryptography & Information Security

Ce cours n'est pas disponible en Français (France)

Nous sommes actuellement en train de le traduire dans plus de langues.
Macquarie University

Applied Cryptography & Information Security

Matt Bushby

Instructeur : Matt Bushby

Inclus avec Coursera Plus

Obtenez un aperçu d'un sujet et apprenez les principes fondamentaux.
1 semaine à compléter
Ă  10 heures par semaine
Planning flexible
Apprenez Ă  votre propre rythme
Obtenez un aperçu d'un sujet et apprenez les principes fondamentaux.
1 semaine à compléter
Ă  10 heures par semaine
Planning flexible
Apprenez Ă  votre propre rythme

Ce que vous apprendrez

  • Cryptographic Principles and Real-World Applications Protect Information Across Platforms and Protocols Cryptography for Future-Proof Security

Compétences que vous acquerrez

  • CatĂ©gorie : Information Privacy
  • CatĂ©gorie : Key Management
  • CatĂ©gorie : Public Key Infrastructure
  • CatĂ©gorie : Authentications
  • CatĂ©gorie : Network Security
  • CatĂ©gorie : Data Security
  • CatĂ©gorie : Data Integrity
  • CatĂ©gorie : Cybersecurity
  • CatĂ©gorie : Cryptography
  • CatĂ©gorie : Virtual Private Networks (VPN)
  • CatĂ©gorie : Advanced Encryption Standard (AES)
  • CatĂ©gorie : Encryption
  • CatĂ©gorie : Wireless Networks
  • CatĂ©gorie : Emerging Technologies
  • CatĂ©gorie : Blockchain

Détails à connaßtre

Certificat partageable

Ajouter Ă  votre profil LinkedIn

Récemment mis à jour !

juin 2025

Évaluations

6 devoirs

Enseigné en Anglais

Découvrez comment les employés des entreprises prestigieuses maßtrisent des compétences recherchées

 logos de Petrobras, TATA, Danone, Capgemini, P&G et L'Oreal

Il y a 6 modules dans ce cours

Cryptography is the backbone of digital security—powering everything from secure messaging and online banking to digital signatures and blockchain. In this foundational topic, you'll explore the core building blocks of modern cryptography, gaining a solid understanding of the essential principles that make secure communication possible. You’ll learn about key security properties such as confidentiality, integrity, and authenticity, and examine the basic cryptographic functions that support them. The topic also introduces symmetric and asymmetric encryption, as well as the role of Public-Key Infrastructure (PKI) in enabling secure digital trust. By the end of this topic, you’ll be equipped with the fundamental knowledge required to understand and apply cryptographic techniques throughout the rest of the course.

Inclus

1 devoir7 plugins

In today’s interconnected world, protecting data both at rest and in transit is essential to maintaining trust and operational integrity. This topic focuses on how cryptographic functions are applied to secure information, ensuring that data remains confidential, authentic, and tamper-proof. You’ll explore key concepts such as authenticity and non-repudiation, and learn how to encrypt and decrypt data effectively across various use cases. From securing individual files to implementing full disk encryption, this topic equips you with practical knowledge to apply cryptographic protections in real-world scenarios. By the end, you’ll understand how to use cryptography to enforce strong information security controls—building a critical layer of defence for digital systems and communications.

Inclus

1 devoir8 plugins

As data moves across networks, ensuring its security is paramount. In this topic, you’ll explore how cryptography underpins the trustworthiness of modern network protocols, and how it is used to secure communications against eavesdropping, tampering, and surveillance. You’ll examine the cryptographic foundations of wired and wireless network protocols, including how encryption secures Wi-Fi, VPNs, and anonymous communication networks like TOR. Additionally, you’ll learn how historical and modern systems demonstrate trust, and how weaknesses in these systems can be exploited through cryptographic attacks. By the end of this topic, you’ll have a deeper understanding of how cryptography defends digital communication, and how to evaluate the security posture of protocols used in today’s networked environments.

Inclus

1 devoir7 plugins

Cryptography not only protects data—it also safeguards software, digital content, and the hardware environments they run on. In this topic, you’ll explore how cryptographic techniques are used to enforce digital rights, protect intellectual property, and prevent reverse engineering of secure applications. You'll dive into tools and strategies such as copyright enforcement, digital rights management (DRM), and program obfuscation, and understand the importance of robust key management and lifecycle practices. The topic also introduces hardware-based security, including Hardware Security Modules (HSMs) and Trusted Execution Environments (TEEs), and how these platforms enhance cryptographic operations. By the end of this module, you’ll understand how cryptography is applied not just in software, but also in hardware-focused environments, helping organisations protect everything from proprietary algorithms to device-level secrets.

Inclus

1 devoir7 plugins

Blockchain technology is transforming the way we think about trust, transparency, and decentralisation. In this topic, you’ll explore the cryptographic foundations of blockchain, gaining insight into how blocks are linked, validated, and secured in distributed networks. You’ll learn how blockchain enables cryptocurrencies, and dive into powerful downstream applications such as smart contracts, access control, distributed ledgers, and voting systems—all underpinned by cryptographic integrity and consensus mechanisms. By the end of this topic, you’ll understand not only how blockchains are constructed, but also how they are being leveraged across industries to secure data, automate trust, and decentralise control.

Inclus

1 devoir6 plugins

As data becomes more valuable—and more vulnerable—organisations must go beyond traditional encryption to protect sensitive information throughout its entire lifecycle. This topic explores the cutting edge of cryptographic innovation in private and confidential computing, where data remains secure even during processing. You’ll examine how emerging technologies like Homomorphic Encryption, Federated Learning, and Multi-Party Computation (MPC) enable secure operations on encrypted data—without ever exposing the underlying information. You'll also learn how to categorise data sensitivity, manage data lifecycles, and prepare for the post-quantum era, where quantum computing threatens to upend current cryptographic standards. By the end of this topic, you’ll have a clear understanding of how advanced cryptography is powering the future of privacy-preserving technologies—ensuring that security doesn't come at the cost of usability or innovation.

Inclus

1 devoir9 plugins

Obtenez un certificat professionnel

Ajoutez ce titre à votre profil LinkedIn, à votre curriculum vitae ou à votre CV. Partagez-le sur les médias sociaux et dans votre évaluation des performances.

Instructeur

Matt Bushby
Macquarie University
4 Cours2 apprenants

Offert par

Macquarie University

En savoir plus sur Computer Security and Networks

Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carriÚre ?

Felipe M.
Étudiant(e) depuis 2018
’Pouvoir suivre des cours Ă  mon rythme Ă  Ă©tĂ© une expĂ©rience extraordinaire. Je peux apprendre chaque fois que mon emploi du temps me le permet et en fonction de mon humeur.’
Jennifer J.
Étudiant(e) depuis 2020
’J'ai directement appliquĂ© les concepts et les compĂ©tences que j'ai appris de mes cours Ă  un nouveau projet passionnant au travail.’
Larry W.
Étudiant(e) depuis 2021
’Lorsque j'ai besoin de cours sur des sujets que mon universitĂ© ne propose pas, Coursera est l'un des meilleurs endroits oĂč se rendre.’
Chaitanya A.
’Apprendre, ce n'est pas seulement s'amĂ©liorer dans son travail : c'est bien plus que cela. Coursera me permet d'apprendre sans limites.’
Coursera Plus

Ouvrez de nouvelles portes avec Coursera Plus

AccĂšs illimitĂ© Ă  10,000+ cours de niveau international, projets pratiques et programmes de certification prĂȘts Ă  l'emploi - tous inclus dans votre abonnement.

Faites progresser votre carriĂšre avec un diplĂŽme en ligne

Obtenez un diplĂŽme auprĂšs d’universitĂ©s de renommĂ©e mondiale - 100 % en ligne

Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires

AmĂ©liorez les compĂ©tences de vos employĂ©s pour exceller dans l’économie numĂ©rique

Foire Aux Questions