Using Cryptography Correctly

Description

Cryptographic primitives are effective tools that can help achieve various security goals. However, programs that use cryptography can often be fragile, and simple programming errors can result in large security "holes." Even worse, a company can come away with a false sense of security if their applications use cryptography— due to simple programming errors in how the cryptography is used, their applications could be just as or more vulnerable to attack, but the company may think that it is secure due to the use of cryptography. This course covers how to use cryptography correctly, and teaches programmers how to avoid many common mistakes that result in gaping security holes.

What you will learn

  • Introduction to Cryptography
  • Using Cryptography Correctly
  • Advanced Topics in Cryptography
  • Symmetric Encryption
  • Public-Key Cryptography
  • User Authentication

Exclusive Interview

  • Parisa Tabriz, Engineering Director, Google

Prerequisites

We recommend that you have the equivalent of a BS in computer science, or a background in cybersecurity.

If you are less familiar with the content, we recommend starting with the course Foundations of Information Security. It provides the fundamentals necessary for subsequent courses in the program.

Time Commitment

This course is approximately 6.5 hours of video content with 1 hour of coursework.

Tuition

The All-Access Plan—a full year to view and complete course materials, video lectures, assignments and exams, at your own pace. Revisit course materials or jump ahead... all content remains at your fingertips year-round.

$2,970 for one-year access to all 8 online courses in the Advanced Cybersecurity Program

Individual Courses—60 days to view and complete course materials, video lectures, assignments and exams, at your own pace.

$495 per online course

Continuing Education Units

By completing this course, you’ll earn 1 Continuing Education Unit (CEU). CEUs cannot be applied toward any Stanford degree. CEU transferability is subject to the receiving institution’s policies.

CPEs: By completing the course, you can qualify for Group A or Group B Continuing Professional Education (CPE) credits to maintain your (ISC)² certifications, such as the CISSP. Final approval of CPEs is subject to (ISC)².

Record of Completion

When you complete each course, you’ll receive an email with a link to download your Record of Completion. This email will be sent to the address you provide in your mystanfordconnection within 3 business days of course completion.

Questions

 scpd-acs-mail@stanford.edu