Cryptography and Digital Certificates

Learn the key principles of encryption, cyber law and cloud security in this two-week online cyber security course from Coventry University.

Duration

2 weeks

Weekly study

5 hours

100% online

How it works

Included in an ExpertTrack

Course 4 of 5

Get full ExpertTrack access

Find out more

Established

1992

Location

Coventry

How does cryptography secure our communication?

Explore the core principles of encryption and cryptography and how they can be applied to enhance cyber security models in real-life settings.

You’ll investigate different encryption methods, digital signatures and certificates, and relevant cyber security laws.

Understand hash functions and encryption methods

Discover how hash functions are used to compress a bulk of message length to a short random-looking, fixed-length message digest.

You’ll also study the two key types of encryption, symmetric encryption, and asymmetric encryption. The course also unpacks the use of digital signatures and certificates as well as other techniques and protocols used for securing communications over a network.

You’ll evaluate different types of attacks on cryptosystems and how to defend against them.

Build your understanding of cyber law

You’ll consider the different types of cybercrime faced by organisations, including cyber-dependent crimes such as hacking and disruption of computer functionality.

You’ll also examine the legal response to cyber crime, including applicable cyber laws and data privacy requirements in the EU.

The course concludes with a look at cloud security issues, studying the emergence of bring your own device policies (BYOD), the emerging trend of employees using their personal devices, and the associated risks.

  • Week 1

    Principles of Cryptography

    • Introduction to cryptography

      This week, we’ll explore some basic cryptography principles, encryption methods, certificates, signatures, attacks and securing communications.

    • Encryptions

      Cryptography encryption methods.

    • Digital signatures and certificates

      Certificate authorities and signatures used for encrypting, decrypting and hiding messages from the sender to receiver.

    • Securing communications

      Techniques and protocols used for securing communications over a network.

    • Crypto system attacks

      Types of attacks on crypto systems and how to defend against them.

    • Summary and reflection

      Reflect on what you have learned this week and what's coming up next.

  • Week 2

    Cyber law and legal responses to cyber crime

    • Welcome to Week 2 and cyber law

      Cyber Law is the law governing cyber space

    • Cyber crime

      The term cybercrime refers to any type of criminal activity conducted through, or using, an Information and Communications Technology (ICT) device.

    • The legal response to cyber crime

      When it comes to cyber-dependent crimes, there are a whole lot of applicable laws

    • Cloud security

      What is the cloud?

    • Sumary and reflection

      Reflect on what you have learned and see what's coming up next.

More courses you might like

Learners who joined this course have also enjoyed these courses.

©2025  onlincourse.com. All rights reserved