- All Courses
- Cryptography
Free Online Cryptography Courses
These free online cryptography courses will teach you everything you need to know about the heart of online security - cryptography. Cryptography is the science of protecting information by making it unreadable by unauthorised parties. This transformation ranges from simple codes to complex ciphers, and is used to protect email messages, credit card information, and more....…Read More
- 11 Free Courses
- 267,540 Learners
- 17,843 Certificates & Diplomas Earned
Most Popular
Cryptography Courses

Diploma in Cyber Security
- Identify and mitigate various cyber threats and attack v...
- Summarise conduct vulnerability assessments and apply pa...
- Discuss the basics of cyber security and their relevance...
- Explain how to ‘harden’ operating systems and... Read More

CompTIA Security+ (SY0-601)
- Differentiate between a ‘threat’ and an ‘attack’
- Explain what ‘vulnerabilities’ are with regards to a net...
- State the importance of authentication and authorization...
- Discuss physical security controls that can b... Read More

CompTIA Security+ (Exam SYO-501)
- Describe the process for analyzing risk
- Discuss identifying security threats
- Explain implementing host and software security
- Indicate managing identity and access Read More

Diploma in Blockchain Technology and Applications
- Explain in simple terms what blockchain is
- Describe the consensus mechanism and hashing
- Summarise blockchain solutions to real-world ... Read More

Advanced Diploma in Cryptography
- Outline the advanced applications of Cryptography
- Discuss the practical instantiations of Pseudorandom Gen...
- Explain how to onstruct CPA-secure ciphers using pseudor...
- Describe the theoretical and practical constr... Read More

Professional Ethical Hacking
- Distinguish between ethical hacking and penetration test...
- Describe an asymmetrically encrypted password
- Discuss the impact of denial of service attacks on an av...
- Discuss the impact of social engineering in t... Read More

Ethical Hacking; Information Security
- Describe the four types of security attacksExplain the a...
- Describe the four types of security attacks
- Explain the active and passive classification... Read More

Diploma in Ethical Hacking
- Compare ethical hacking and penetration testing
- Explain how network scan, port scan and vulnerability sc...
- Explain how to use Metasploit for penetration into Windo...
- Explain the meaning of the term "Social Engin... Read More

Cryptography: Pseudo-Random Generators and Block Ciphers
- Discuss the theoretical instantiations of Pseudo-Random ...
- Discuss the practical instantiations of Pseudo-Random Ge...
- Outline the limitations of Stream Ciphers Read More

Fundamentals of Blockchain and Bitcoin
- Define ‘Blockchain’
- Distinguish between the concepts of decentralisation and...
- Explain the structure of a block in Blockchai... Read More

IBM Blockchain Platform as a Service
- Discuss the benefits of using IBM Blockchain as a servic...
- Estimate the cost of using IBM Blockchain for your proje...
- List steps for deploying an application on IB... Read More
Benefits Of An Alison Certificate
Certify Your Skills
A CPD accredited Alison Certificate certifies the skills you’ve learnedStand Out From The Crowd
Add your Alison Certification to your resumé and stay ahead of the competitionAdvance in Your Career
Share your Alison Certification with potential employers to show off your skills and capabilities

Explore Courses By Category
Explore In-Demand Careers
Discover More CareersPopular Course Creators
Over 45 million learners have used Alison to empower themselves
Not sure where to begin?
What is your main goal on Alison?
- 4,500+ free courses
- 45 million+ learners
- 10 million+ graduates
- 195 countries