This course is part of the Digital Security Training: Cyber Threats and Risk Management ExpertTrack
Cryptography and Digital Certificates
Understand cryptographic concepts and explore cyber laws and the legal implications of globalised data and access.

- Duration2 weeks
- Weekly study5 hours
- 100% onlineTry this course for free
- Included in an ExpertTrackCourse 4 of 5
- Get full ExpertTrack access$39/month
Cryptography and Digital Certificates
How does cryptography secure our communication?
Explore the core principles of encryption and cryptography and how they can be applied to enhance cyber security models in real-life settings.
You’ll investigate different encryption methods, digital signatures and certificates, and relevant cyber security laws.
Understand hash functions and encryption methods
Discover how hash functions are used to compress a bulk of message length to a short random-looking, fixed-length message digest.
You’ll also study the two key types of encryption, symmetric encryption, and asymmetric encryption. The course also unpacks the use of digital signatures and certificates as well as other techniques and protocols used for securing communications over a network.
You’ll evaluate different types of attacks on cryptosystems and how to defend against them.
Build your understanding of cyber law
You’ll consider the different types of cybercrime faced by organisations, including cyber-dependent crimes such as hacking and disruption of computer functionality.
You’ll also examine the legal response to cyber crime, including applicable cyber laws and data privacy requirements in the EU.
The course concludes with a look at cloud security issues, studying the emergence of bring your own device policies (BYOD), the emerging trend of employees using their personal devices, and the associated risks.
Syllabus
Week 1
Principles of Cryptography
Introduction to cryptography
This week, we’ll explore some basic cryptography principles, encryption methods, certificates, signatures, attacks and securing communications.
Encryptions
Cryptography encryption methods.
Digital signatures and certificates
Certificate authorities and signatures used for encrypting, decrypting and hiding messages from the sender to receiver.
Securing communications
Techniques and protocols used for securing communications over a network.
Crypto system attacks
Types of attacks on crypto systems and how to defend against them.
Summary and reflection
Reflect on what you have learned this week and what's coming up next.
Week 2
Cyber law and legal responses to cyber crime
Welcome to Week 2 and cyber law
Cyber Law is the law governing cyber space
Cyber crime
The term cybercrime refers to any type of criminal activity conducted through, or using, an Information and Communications Technology (ICT) device.
The legal response to cyber crime
When it comes to cyber-dependent crimes, there are a whole lot of applicable laws
Cloud security
What is the cloud?
Sumary and reflection
Reflect on what you have learned and see what's coming up next.
Prove you're job ready
Highlight the new, job-relevant skills you’ve gained and supplement existing qualifications with a hard-earned, industry-specific digital certificate – plus one for every course within your ExpertTrack.
- Learn the latest in your chosen industry or subject.
- Complete each course and pass assessments.
- Receive certificates validated by the educating organisation.
- Create a shareable certificate link for your CV and LinkedIn.
- Impress employers with learning outcomes you can add to your CV.
- Make your career dreams a reality.
Download a PDF
Share your certificate
What will you achieve?
By the end of the course, you‘ll be able to...
- Assess simple cryptographic methods from a practical and theoretical viewpoint
- Discuss certificate authorities, trusted platform modules and concepts such as chain of trust
- Demonstrate the use of public key infrastructure and problems encountered
- Assess and evaluate various cyber law theories
- Evaluate a sound knowledge of the various legal implications of data and access
Who is the course for?
This course is for anyone who is keen to increase their knowledge of digital security risks and the tools and techniques used to guard against them.
Start learning today - free 7-day trial
After your free trial you can: