Master symmetric encryption algorithms and techniques to implement secure data protection systems and cryptographic protocols.
Master symmetric encryption algorithms and techniques to implement secure data protection systems and cryptographic protocols.
This comprehensive course explores symmetric cryptography, from classical substitution and transposition techniques to modern block ciphers. Students learn fundamental concepts and practical implementations of encryption algorithms including DES, 3-DES, and AES. The course covers various block cipher operation modes and their applications in real-world security systems.
4.5
(256 ratings)
15,338 already enrolled
Instructors:
English
پښتو, বাংলা, اردو, 3 more
What you'll learn
Master classical cipher techniques
Understand modern block cipher algorithms
Implement DES and AES encryption
Apply various cipher operation modes
Analyze cryptographic security
Design secure encryption systems
Skills you'll gain
This course includes:
2.5 Hours PreRecorded video
10 quizzes
Access on Desktop
FullTime access
Shareable certificate
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 5 modules in this course
This course provides a thorough examination of symmetric cryptography, progressing from classical ciphers to modern encryption algorithms. Students learn about substitution and transposition techniques, block ciphers including DES and AES, and various operation modes. The curriculum balances theoretical understanding with practical implementation considerations.
Classical Cipher: Substitution
Module 1 · 3 Hours to complete
Classical Cipher: Transposition
Module 2 · 1 Hours to complete
Block Cipher and DES
Module 3 · 3 Hours to complete
3-DES and AES
Module 4 · 2 Hours to complete
Block Cipher Operation Modes
Module 5 · 2 Hours to complete
Fee Structure
Instructor
Assistant Professor in Computer Science
Sang-Yoon Chang is an Assistant Professor in the Computer Science Department at the University of Colorado Colorado Springs (UCCS). His research focuses on critical areas of computer security and computer networks, particularly in wireless networks, edge computing, and cyber-physical systems. His work intersects with the burgeoning fields of the Internet of Things (IoT) and cyber-physical systems, making significant contributions to the security of these evolving technologies.Professor Chang's expertise in cryptography and network security is evident in the courses he teaches, which include Asymmetric Cryptography and Key Management, Classical Cryptosystems and Core Concepts, Cryptographic Hash and Integrity Protection, Cryptography and Information Theory, Mathematical Foundations for Cryptography, and Symmetric Cryptography. These courses reflect his deep knowledge in securing digital communications and ensuring the integrity of systems, particularly in the context of emerging technologies such as IoT and edge computing.Through his teaching and research, Professor Chang is committed to advancing the understanding and implementation of robust security mechanisms for modern computing systems and infrastructures.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.5 course rating
256 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.