Understand the math of secrets. Implement secure encryption, hashing, and PKI protocols while avoiding common implementation pitfalls.
Cryptography protects the internet, but it is easy to get wrong. This course goes beyond using libraries to understanding the underlying mechanics of AES, RSA, and Elliptic Curve Cryptography (ECC). You will learn the difference between symmetric and asymmetric encryption, how hashing secures passwords, and how Digital Signatures verify authenticity. We focus on proper implementation: managing keys, configuring TLS, and avoiding known attacks like padding oracles.
Estimated completion time: 21 lessons • Self-paced learning • Lifetime access
Yes, requires understanding number theory and algebra.
You implement them to learn, but use libs in prod.
We cover the hashing/signatures used in blockchain.
We discuss Post-Quantum Cryptography trends.