Understand cryptographic concepts and explore cyber laws and the legal implications of globalised data and access.

  • Duration

    2 weeks
  • Weekly study

    5 hours
  • 100% online

    How it works
  • Included in an ExpertTrack

    Course 4 of 5
  • Get full ExpertTrack access

    $39/monthFind out more

How does cryptography secure our communication?

Explore the core principles of encryption and cryptography and how they can be applied to enhance cyber security models in real-life settings.

You’ll investigate different encryption methods, digital signatures and certificates, and relevant cyber security laws.

Understand hash functions and encryption methods

Discover how hash functions are used to compress a bulk of message length to a short random-looking, fixed-length message digest.

You’ll also study the two key types of encryption, symmetric encryption, and asymmetric encryption. The course also unpacks the use of digital signatures and certificates as well as other techniques and protocols used for securing communications over a network.

You’ll evaluate different types of attacks on cryptosystems and how to defend against them.

Build your understanding of cyber law

You’ll consider the different types of cybercrime faced by organisations, including cyber-dependent crimes such as hacking and disruption of computer functionality.

You’ll also examine the legal response to cyber crime, including applicable cyber laws and data privacy requirements in the EU.

The course concludes with a look at cloud security issues, studying the emergence of bring your own device policies (BYOD), the emerging trend of employees using their personal devices, and the associated risks.

Syllabus

  • Week 1

    Principles of Cryptography

    • Introduction to cryptography

      This week, we’ll explore some basic cryptography principles, encryption methods, certificates, signatures, attacks and securing communications.

    • Encryptions

      Cryptography encryption methods.

    • Digital signatures and certificates

      Certificate authorities and signatures used for encrypting, decrypting and hiding messages from the sender to receiver.

    • Securing communications

      Techniques and protocols used for securing communications over a network.

    • Crypto system attacks

      Types of attacks on crypto systems and how to defend against them.

    • Summary and reflection

      Reflect on what you have learned this week and what's coming up next.

  • Week 2

    Cyber law and legal responses to cyber crime

    • Welcome to Week 2 and cyber law

      Cyber Law is the law governing cyber space

    • Cyber crime

      The term cybercrime refers to any type of criminal activity conducted through, or using, an Information and Communications Technology (ICT) device.

    • The legal response to cyber crime

      When it comes to cyber-dependent crimes, there are a whole lot of applicable laws

    • Cloud security

      What is the cloud?

    • Sumary and reflection

      Reflect on what you have learned and see what's coming up next.

Prove you're job ready

Highlight the new, job-relevant skills you’ve gained and supplement existing qualifications with a hard-earned, industry-specific digital certificate – plus one for every course within your ExpertTrack.

  • Learn the latest in your chosen industry or subject.
  • Complete each course and pass assessments.
  • Receive certificates validated by the educating organisation.
  • Impress employers with learning outcomes you can add to your CV.
  • Make your career dreams a reality.

Download a PDF

Learning on this course

On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Assess simple cryptographic methods from a practical and theoretical viewpoint
  • Discuss certificate authorities, trusted platform modules and concepts such as chain of trust
  • Demonstrate the use of public key infrastructure and problems encountered
  • Assess and evaluate various cyber law theories
  • Evaluate a sound knowledge of the various legal implications of data and access

Who is the course for?

This course is for anyone who is keen to increase their knowledge of digital security risks and the tools and techniques used to guard against them.

Who developed the course?

Coventry University

Coventry secured 5 QS Stars for Teaching and Online Learning in the QS World University Ranking 2020 and has received No. 1 in the world for Massive Open Online Courses in MoocLab’s World University Ranking 2021.

  • Established

    1992
  • Location

    Coventry

About this ExpertTrack

Explore how to protect against cyber attacks using the key principles of digital security.

Start learning today - free 2-day trial

After your free trial you can:

  • Pay $39 per month to keep learning online
  • Have complete control over your subscription; you can cancel any time
  • Work at your own pace and set your own deadlines at every stage
  • Only pay while you’re learning; the subscription will cancel automatically when you finish
  • Complete online assessments to test your knowledge and prove your skills
  • Earn digital course certificates and a final award that you can share online, with potential employers, and your professional network
  • Keep access to the content of courses you complete even after your subscription ends

Learning on FutureLearn

Your learning, your rules

  • Courses are split into weeks, activities, and steps to help you keep track of your learning
  • Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
  • Stay motivated by using the Progress page to keep track of your step completion and assessment scores

Join a global classroom

  • Experience the power of social learning, and get inspired by an international network of learners
  • Share ideas with your peers and course educators on every step of the course
  • Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others

Map your progress

  • As you work through the course, use notifications and the Progress page to guide your learning
  • Whenever you’re ready, mark each step as complete, you’re in control
  • Complete 90% of course steps and all of the assessments to earn your certificate

Want to know more about learning on FutureLearn? Using FutureLearn

Do you know someone who'd love this course? Tell them about it...