Module #1 Introduction to Cryptography Overview of cryptography, its importance, and fundamental concepts
Module #2 Number Theory Basics Review of number theory concepts relevant to cryptography, such as prime numbers, modular arithmetic, and Fermats Little Theorem
Module #3 Block Ciphers Introduction to block ciphers, including substitution-permutation networks, Feistel ciphers, and modes of operation
Module #4 AES Algorithm In-depth study of the Advanced Encryption Standard (AES) algorithm, including its key schedule and encryption/decryption processes
Module #5 Stream Ciphers Introduction to stream ciphers, including linear feedback shift registers and nonlinear feedback shift registers
Module #6 RSA Algorithm In-depth study of the RSA algorithm, including key generation, encryption, and decryption
Module #7 Diffie-Hellman Key Exchange Introduction to the Diffie-Hellman key exchange protocol, including its security and implementation
Module #8 Public-Key Cryptography Overview of public-key cryptography, including key management and certificate authorities
Module #9 Hash Functions Introduction to hash functions, including message digest algorithms and collision attacks
Module #10 SHA-256 and SHA-3 Algorithms In-depth study of the SHA-256 and SHA-3 hash algorithms, including their design and security features
Module #11 Digital Signatures Introduction to digital signatures, including the RSA and ECDSA signature schemes
Module #12 Elliptic Curve Cryptography Introduction to elliptic curve cryptography, including key exchange, encryption, and signatures
Module #13 Cryptographic Protocols Overview of cryptographic protocols, including secure socket layer (SSL) and transport layer security (TLS)
Module #14 Secure Email Communication Introduction to secure email communication, including PGP and S/MIME
Module #15 Secure Voting Systems Introduction to secure voting systems, including homomorphic encryption and zero-knowledge proofs
Module #16 Cryptanalysis Introduction to cryptanalysis, including frequency analysis, differential cryptanalysis, and side-channel attacks
Module #17 Quantum Cryptography Introduction to quantum cryptography, including quantum key distribution and quantum key exchange
Module #18 Blockchain and Cryptocurrencies Introduction to blockchain and cryptocurrencies, including Bitcoin and Ethereum
Module #19 Post-Quantum Cryptography Introduction to post-quantum cryptography, including lattice-based and code-based cryptography
Module #20 Secure Multi-Party Computation Introduction to secure multi-party computation, including secret sharing and secure function evaluation
Module #21 Homomorphic Encryption In-depth study of homomorphic encryption, including fully homomorphic encryption and somewhat homomorphic encryption
Module #22 Zero-Knowledge Proofs Introduction to zero-knowledge proofs, including interactive and non-interactive proofs
Module #23 Secure Communication Protocols Introduction to secure communication protocols, including secure sockets and IPsec
Module #24 Cryptographic Protocols in Practice Case studies of cryptographic protocols in practice, including WhatsApp and Signal
Module #25 Cryptography in Cloud Computing Introduction to cryptography in cloud computing, including homomorphic encryption and secure multi-party computation
Module #26 Cryptography in Internet of Things (IoT) Introduction to cryptography in IoT, including lightweight cryptography and secure communication protocols
Module #27 Cryptography in Artificial Intelligence and Machine Learning Introduction to cryptography in AI and ML, including secure model inference and secure data sharing
Module #28 Cryptography and Privacy Introduction to cryptography and privacy, including differential privacy and secure data analysis
Module #29 Cryptography and Regulatory Compliance Introduction to cryptography and regulatory compliance, including GDPR and HIPAA
Module #30 Course Wrap-Up & Conclusion Planning next steps in Cryptographic Protocols and Algorithms career