Macquarie University
Applied Cryptography & Information Security
Macquarie University

Applied Cryptography & Information Security

Matt Bushby

Instructor: Matt Bushby

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Cryptographic Principles and Real-World Applications Protect Information Across Platforms and Protocols Cryptography for Future-Proof Security

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

June 2025

Assessments

6 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 6 modules in this course

Cryptography is the backbone of digital security—powering everything from secure messaging and online banking to digital signatures and blockchain. In this foundational topic, you'll explore the core building blocks of modern cryptography, gaining a solid understanding of the essential principles that make secure communication possible. You’ll learn about key security properties such as confidentiality, integrity, and authenticity, and examine the basic cryptographic functions that support them. The topic also introduces symmetric and asymmetric encryption, as well as the role of Public-Key Infrastructure (PKI) in enabling secure digital trust. By the end of this topic, you’ll be equipped with the fundamental knowledge required to understand and apply cryptographic techniques throughout the rest of the course.

What's included

1 assignment7 plugins

In today’s interconnected world, protecting data both at rest and in transit is essential to maintaining trust and operational integrity. This topic focuses on how cryptographic functions are applied to secure information, ensuring that data remains confidential, authentic, and tamper-proof. You’ll explore key concepts such as authenticity and non-repudiation, and learn how to encrypt and decrypt data effectively across various use cases. From securing individual files to implementing full disk encryption, this topic equips you with practical knowledge to apply cryptographic protections in real-world scenarios. By the end, you’ll understand how to use cryptography to enforce strong information security controls—building a critical layer of defence for digital systems and communications.

What's included

1 assignment8 plugins

As data moves across networks, ensuring its security is paramount. In this topic, you’ll explore how cryptography underpins the trustworthiness of modern network protocols, and how it is used to secure communications against eavesdropping, tampering, and surveillance. You’ll examine the cryptographic foundations of wired and wireless network protocols, including how encryption secures Wi-Fi, VPNs, and anonymous communication networks like TOR. Additionally, you’ll learn how historical and modern systems demonstrate trust, and how weaknesses in these systems can be exploited through cryptographic attacks. By the end of this topic, you’ll have a deeper understanding of how cryptography defends digital communication, and how to evaluate the security posture of protocols used in today’s networked environments.

What's included

1 assignment7 plugins

Cryptography not only protects data—it also safeguards software, digital content, and the hardware environments they run on. In this topic, you’ll explore how cryptographic techniques are used to enforce digital rights, protect intellectual property, and prevent reverse engineering of secure applications. You'll dive into tools and strategies such as copyright enforcement, digital rights management (DRM), and program obfuscation, and understand the importance of robust key management and lifecycle practices. The topic also introduces hardware-based security, including Hardware Security Modules (HSMs) and Trusted Execution Environments (TEEs), and how these platforms enhance cryptographic operations. By the end of this module, you’ll understand how cryptography is applied not just in software, but also in hardware-focused environments, helping organisations protect everything from proprietary algorithms to device-level secrets.

What's included

1 assignment7 plugins

Blockchain technology is transforming the way we think about trust, transparency, and decentralisation. In this topic, you’ll explore the cryptographic foundations of blockchain, gaining insight into how blocks are linked, validated, and secured in distributed networks. You’ll learn how blockchain enables cryptocurrencies, and dive into powerful downstream applications such as smart contracts, access control, distributed ledgers, and voting systems—all underpinned by cryptographic integrity and consensus mechanisms. By the end of this topic, you’ll understand not only how blockchains are constructed, but also how they are being leveraged across industries to secure data, automate trust, and decentralise control.

What's included

1 assignment6 plugins

As data becomes more valuable—and more vulnerable—organisations must go beyond traditional encryption to protect sensitive information throughout its entire lifecycle. This topic explores the cutting edge of cryptographic innovation in private and confidential computing, where data remains secure even during processing. You’ll examine how emerging technologies like Homomorphic Encryption, Federated Learning, and Multi-Party Computation (MPC) enable secure operations on encrypted data—without ever exposing the underlying information. You'll also learn how to categorise data sensitivity, manage data lifecycles, and prepare for the post-quantum era, where quantum computing threatens to upend current cryptographic standards. By the end of this topic, you’ll have a clear understanding of how advanced cryptography is powering the future of privacy-preserving technologies—ensuring that security doesn't come at the cost of usability or innovation.

What's included

1 assignment9 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
0 Courses0 learners

Offered by

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Computer Security and Networks? Start here.

Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions