RiseUpp Logo
Educator Logo

Basic Cryptography and Programming with Crypto API

Master cryptography fundamentals and develop secure applications using Crypto API. Learn encryption, decryption, and secure programming.

Master cryptography fundamentals and develop secure applications using Crypto API. Learn encryption, decryption, and secure programming.

This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Fundamentals of Computer Network Security Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.

4.5

(88 ratings)

13,936 already enrolled

Instructors:

English

پښتو, বাংলা, اردو, 3 more

Powered by

Provider Logo
Basic Cryptography and Programming with Crypto API

This course includes

16 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

What you'll learn

  • Understand basic cryptography concepts and principles

  • Implement symmetric and asymmetric key encryption algorithms

  • Develop secure applications using Crypto API

  • Enhance web application security through cryptographic techniques

  • Master RSA algorithm and Diffie-Hellman key exchange

Skills you'll gain

Cryptography
RSA Algorithm
AES
DES
Symmetric Encryption
Asymmetric Encryption
Network Security
PHP Crypto API
Digital Signatures
Secure Programming

This course includes:

3.4 Hours PreRecorded video

4 assignments

Access on Mobile, Tablet, Desktop

FullTime access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 4 modules in this course

This comprehensive course covers fundamental cryptography concepts and practical implementation using Crypto API. Students learn basic cryptography principles, symmetric and asymmetric key algorithms, and secure programming techniques. The curriculum includes hands-on projects in encryption, decryption, digital signatures, and secure web application development. Through practical exercises and real-world examples, learners gain essential skills in implementing cryptographic solutions and enhancing application security.

Basic Cryptography

Module 1 · 4 Hours to complete

Symmetric Key Cryptography

Module 2 · 6 Hours to complete

Asymmetric Key Cryptography

Module 3 · 3 Hours to complete

Develop Secure Programs with Crypto API

Module 4 · 2 Hours to complete

Fee Structure

Instructor

Edward Chow
Edward Chow

4.3 rating

98 Reviews

1,23,746 Students

8 Courses

Distinguished Expert in Cybersecurity and Network Systems

Edward Chow serves as Professor of Computer Science at the University of Colorado Colorado Springs, bringing over three decades of expertise in network security and system design. After earning his Ph.D. from the University of Texas at Austin in 1985, he worked at Bell Communications Research before joining UCCS in 1991. His research focuses on improving security, reliability, and performance of network systems, leading to two US patents in distributed network restoration and survivable architecture. On Coursera, he leads the Advanced System Security Design Specialization, which has attracted over 9,207 students, teaching courses in cloud computing security, TOR networks, and DDoS defense. His recent innovations include developing efficient Internet Security protocols for online storage systems and creating secure information sharing systems using attribute certificates. His current work involves Software Defined Networks for defending against DDoS attacks and enhancing data security through right path right place data delivery (R2D2). His contributions extend to assistive technologies, combining Laban dance notation with wireless sensor-based human motion tracking systems for rehabilitation care.

Basic Cryptography and Programming with Crypto API

This course includes

16 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

4.5 course rating

88 ratings

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.