Course Description
In this course, students learn to deploy cryptographic tools to secure their applications and services. Students will create secure communications in public channels using public-key cryptography. They will also explore methods of authenticating messages to ensure that they haven’t been tampered with in transit. And lastly, they will learn how to use digital signatures and zero-knowledge proofs to let others verify the messages sent through your services.
Cryptography Implementation Dec 2025Cryptography Implementation
Understanding Cryptography
Understanding Cryptoanalysis
Classical Cryptography
Password Best Practices
Obfuscating Data
Cryptographic Math and Frequency Analysis
Steam Ciphers and Block Ciphers
Use Steam Ciphers
Use Block Ciphers
Advanced Encryption Standard
Using Cryptography with Images
Image Cryptography
Images and Cryptography Libraries
Stenography
Message Integrity
Message Authentication Code
Setting up a Secure Channel
Cryptographic Applications and PKI
The Public-Key Transformation
The El-Gamal Cryptosystem
Elliptic Curve Cryptography
Learn best practices for using cryptography
Learn how to implement proven cryptographic tools, using easy-to-understand examples
Understand which cryptographic tools to use depending on the problem
Understand the pros and cons of various authentication methods
Ensure that your applications and systems are using up-to-date cryptography
Implementing digital signatures and zero-knowledge proofs
Related Certificates
Earning a Saint Louis University Workforce Center certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
ISACA Professional Certificate
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Large Language Models Foundations
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Machine Learning for Cybersecurity Operations
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the cybersecurity industry. The emergence of ML as a tool for...
See Details