Cryptocurrency & Blockchain
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Cryptography and Digital Certificates

Course Cover
compare button icon

Course Features

icon

Duration

2 weeks

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Mobile, Desktop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Effort

5 hours per week

icon

Teaching Type

Self Paced

Course Description

Learn the fundamental principles of encryption and cryptography, and how you can apply them to improve cyber security models in real life.

You will examine different encryption methods, digital certificates and signatures, as well as relevant cyber security laws.

Learn how hash functions can be used to compress message lengths to create a short, random-looking message digest.

The course will also cover the two main types of encryption: symmetric encryption and asymmetric encryption. This course will also cover digital signatures, certificates, and other protocols that are used to secure communications over networks.

Learn how to defend yourself against different attacks on cryptosystems.

We'll be discussing the various types of cybercrime that organisations face, as well as cyber-dependent crimes like hacking and disruption to computer functionality.

The legal response to cybercrime, including the applicable cyber laws in the EU, will also be examined.

The course ends with an overview of cloud security issues. It examines the emergence and use of Bring Your Own Device Policies (BYOD), as well as the rising trend of employees using personal devices.

Course Overview

projects-img

Alumni Network

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Assess and evaluate various cyber law theories

Assess simple cryptographic methods from a practical and theoretical viewpoint

Demonstrate the use of public key infrastructure and problems encountered

Discuss certificate authorities, trusted platform modules and concepts such as chain of trust

Evaluate a sound knowledge of the various legal implications of data and access

Target Students

This course is for anyone who is keen to increase their knowledge of digital security risks and the tools and techniques used to guard against them

Course Cover