Understand cryptographic concepts and explore cyber laws and the legal implications of globalised data and access.
Duration
2 weeksWeekly study
5 hours
Cryptography and Digital Certificates
Other courses you might like
This course isn't running right now. We can email you when it starts again, or check out these other courses you might like.
Browse more in IT & Computer Science
Discover how cryptography secures our communication
Explore the core principles of encryption and cryptography and how they can be applied to enhance cyber security models in real-life settings.
You’ll investigate different encryption methods, digital signatures and certificates, and relevant cyber security laws.
Understand hash functions and encryption methods
Discover how hash functions are used to compress a bulk of message length to a short random-looking, fixed-length message digest.
You’ll also study the two key types of encryption, symmetric encryption, and asymmetric encryption.
On this course you’ll unpack the use of digital signatures and certificates as well as other techniques and protocols used for securing communications over a network.
You’ll evaluate different types of attacks on cryptosystems and how to defend against them.
Build your understanding of cyber law
You’ll consider the different types of cybercrime faced by organisations, including cyber-dependent crimes such as hacking and disruption of computer functionality.
You’ll also examine the legal response to cyber crime, including applicable cyber laws and data privacy requirements in the EU.
The course concludes with a look at cloud security issues, studying the emergence of bring your own device policies (BYOD), the emerging trend of employees using their personal devices, and the associated risks.
What topics will you cover?
- Cryptographic concepts, algorithms and attacks within the context of cyber security
- Digital signatures and digital certificates
- The Public Key Infrastructure (PKI) and its problems
- The legal implications of globalised data and access
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Assess simple cryptographic methods from a practical and theoretical viewpoint
- Discuss certificate authorities, trusted platform modules and concepts such as chain of trust
- Demonstrate the use of public key infrastructure and problems encountered
- Assess and evaluate various cyber law theories
- Evaluate a sound knowledge of the various legal implications of data and access
Who is the course for?
This course is for anyone who is keen to increase their knowledge of digital security risks and the tools and techniques used to guard against them.
To further your understanding, you may be interested in these courses, from the same provider, that share the same overall learning outcomes:
Learning on FutureLearn
Your learning, your rules
- Courses are split into weeks, activities, and steps to help you keep track of your learning
- Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
- Stay motivated by using the Progress page to keep track of your step completion and assessment scores
Join a global classroom
- Experience the power of social learning, and get inspired by an international network of learners
- Share ideas with your peers and course educators on every step of the course
- Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others
Map your progress
- As you work through the course, use notifications and the Progress page to guide your learning
- Whenever you’re ready, mark each step as complete, you’re in control
- Complete 90% of course steps and all of the assessments to earn your certificate
Want to know more about learning on FutureLearn? Using FutureLearn
Learner reviews
Learner reviews cannot be loaded due to your cookie settings. Please and refresh the page to view this content.