Free Short Course: Cryptography

Understanding cyber security is becoming increasingly important in our always changing, permanently connected, digital lives. Our digital footprint is ever growing and the prerequisite to keep our digital identities safe and procure is becoming increasingly important as our reliance on on-line technologies grows .
Understanding how to leverage available technology to protect ourselves against the countless of attacks on our privacy and digital identities is vital ; and cognition of cryptanalytic technologies is one of the foundation stones upon which we can build protection for our digital self .

Enter your details below to register:



BeginnerMore Info Entry-level short course, suitable for those with no or little prior cognition. May provide foundation cognition for higher, Masters-level short courses, or for CSU Masters subjects

Duration 4 Weeks
Enrolled 6,840 students
Cost Free!

Course Schedule

Module 1: Introduction to Security & Cryptography

With concepts taken from ITI581 and ITC593, in this subject we discuss some of the fundamental concepts of information security and unpack some of the primitives of cryptanalysis. This topic will provide the basis for the topics in the following 3 weeks.

Some of the basic concepts for this topic will include ;

  • Useful cyber security and cryptography definitions
  • The importance and application of the CIA Triad
  • Defence in depth and how cryptography fits with this concept
  • Primitives of cryptography (Random numbers, Asymmetric and Symmetric concepts, Hashing)

Module 2: Symmetric Encryption

With concepts chiefly taken from ITC593, in this subject we will delve into the global of symmetrical encoding. We will begin with some definitions, potential attack vectors and bare examples before examining exercise symmetrical ciphers to help you understand how they work to protect your on-line data .
Cipher types examined will include :

  • Substitution ciphers
  • Transposition ciphers

We will besides take a foundational look at the operations of two long-familiar symmetrical encoding standards ( DES & AES ) .

Module 3: Asymmetric Encryption

With concepts chiefly taken from ITC593, in this subject we will examine the fundamental concepts of asymmetrical ciphers, differently known as public-key encoding schemes. We will discuss how having two keys enhances security compared with symmetrical encoding and some of the ways in which asymmetrical encoding is normally used .
We will use the RSA algorithm as our primary example and perform some hands-on encoding and decoding using it .

Module 4: Hashing Functions

In our final examination topic, taken primarily from ITC593, we explore the fundamental concepts of hashing algorithm. We will compare the similarities and differences between encoding and hashing techniques a well as how hashing techniques provide an extra layer of security to encoding through the provision of integrity. last, we will explore how hash techniques are normally used and some of the electric potential attack vectors targeted at hashing implementations .


  • Exam pass mark: 50%
  • Time limit: 1 hour
  • Attempts allowed: one
  • Format: 40 multiple choice – may include standard multiple choice, WXYZ multiple choice, drag and drop, fill in the blank and scenario based questions.

Course Information Q&A

Who will present the webinars?

Matt Constable will be your facilitator for the Cryptography short path .
Matt is a lifelong apprentice with academic degree qualifications in Computing, Psychology and Exercise Science, and Masters ’ qualifications in Computer Security and Exercise Physiology. He is besides presently pursuing a PhD in Sports Biomechanics. A 30-year veteran of the IT industry, he has across-the-board know across a variety show of areas including network engineer, cyber security, Voice over Internet Protocol ( VoIP ), contact center and wireless technologies. He has been employed in respective public and secret sector enterprises as both a customer and an integrator/service provider. At respective times, he has held professional grade certifications with numerous vendors including Cisco, Juniper, Checkpoint, ISC2, Novell, Microsoft, SANS, F5 & Radware .
Matt has been an adjunct lector at Charles Sturt University since 2007, teaching subjects in the IT Masters programs .

What is the aim of this short course?

The bearing of this unretentive run is to provide you with a fundamental understanding of cryptography and how it can be usefully implemented as a separate of a defense in depth security blueprint. The inadequate course is primarily based on two subjects within the CSU/IT Masters stable of subjects : ITI581 Cybersecurity Fundamentals & ITC593 Network Security & Cryptography. Both of these subjects are available as either core or elective subjects across respective Masters ’ level courses, including Masters ’ of Cyber Security, Cloud Computing and Virtualisation, and Networking and Systems Administration .

What is included?

In addition to the weekly hour-long interactional webinars, you will be provided with extra suggested take materials, video resources, quizzes, versatile practical exercises, and discussion forum topics to complete each workweek .

Is there a final exam?

Yes — the short naturally examination will be a timed, open-book examination that you will sit at your computer .

Do I get a completion certificate if I complete the course?

Yes — provided you receive a legislate marker ( 50 % or over ) for the examination .

Will the course qualify me for university credit?

Yes — successful completion of three or more of our brusque courses will qualify you for one credit for an diligence elective subject in our graduate courses. Click here for further details.

Are there any pre-requisites for the course?

While this class can be completed by itself it is useful to have some basic IT cognition. If you don ’ t have a background in Cyber Security or basic IT knowledge, we recommend you complete our free short course Computer Network Fundamentals ahead .

Will I need to purchase any study materials to complete the course?

No — all essential materials will be supplied .

Will the webinars be recorded?

Yes — all webinars are recorded and you will be able to access them, and all other release class materials, by registering for the course .

reference :
Category : crypto topics

Leave a Reply

Your email address will not be published.