Free Course Image Applied Cryptography: AES, RSA, ECC, TLS, Tor and Bitcoin

Free online courseApplied Cryptography: AES, RSA, ECC, TLS, Tor and Bitcoin

Duration of the online course: 13 hours and 20 minutes

New

Build practical crypto skills in this free online course: master AES, RSA, ECC, TLS, Tor and Bitcoin basics, with exercises and a shareable certificate.

In this free course, learn about

  • Applied crypto mindset for IT engineers: practical threat models, protocols, and real-world constraints
  • Randomness & PRNG basics; why OTP/stream ciphers fail when keystreams/nonces are reused
  • ASN.1 data structures and why DER’s canonical encoding is preferred over BER in crypto
  • Hash functions & HMAC; properties like collision resistance enabling commitments and integrity
  • Block ciphers (AES) and modes; why CBC with random IV beats ECB for large/structured data
  • Public-key cryptography with RSA; requirements for secure key agreement over public channels
  • Elliptic-curve crypto and ECDSA; why fresh, secret, unbiased nonces are critical per signature
  • PKI and X.509 certificates: binding identities to public keys and enabling trust chains
  • Revocation checking via CRL/OCSP; interpreting freshness fields (e.g., nextUpdate) correctly
  • Digital signatures (XAdES) and long-term validation evidence (timestamps) beyond cert expiry
  • Smart cards (EstEID/JavaCard): key gen/signing, performance gains from ECC, and attack surfaces
  • TLS basics and advanced: handshake goals, key exchange choices, and enabling PFS with (EC)DHE
  • Tor onion routing: layered encryption and relay separation to hide source vs destination linkage
  • Bitcoin PoW and blockchain: decentralized ledger integrity/authenticity via hash chaining + consensus

Course Description

Modern security depends on cryptography that works reliably in real systems, not just on paper. This course helps you build applied, hands-on intuition for the algorithms and protocols that protect data every day, from messaging apps and web browsers to smart cards and cryptocurrencies. You will learn how real implementations make design trade-offs, where common failures come from, and how to reason about security properties in ways that map directly to engineering decisions.

Starting from randomness and the role of PRNGs, you will see why key reuse can instantly undermine otherwise strong schemes and how stream encryption goes wrong in practice. You will also gain the ability to recognize the importance of data encoding in security, understanding how standards such as ASN.1 and DER influence interoperability and prevent ambiguous interpretations that attackers can exploit. As you work through hashes and message authentication, you will develop a clear mental model of integrity, authenticity, and the guarantees that HMAC provides in real-world settings.

The course then connects theory to widely deployed primitives. You will strengthen your grasp of symmetric encryption with AES and learn why modes of operation matter, especially when encrypting larger or structured data. On the public-key side, you will understand how RSA and elliptic-curve cryptography enable secure key exchange and digital signatures, and why details like nonce generation in ECDSA can be the difference between strong security and catastrophic private-key leakage. You will also learn how trust is managed at scale through X.509 certificates and PKI, and how revocation mechanisms such as CRLs and OCSP fit into the lifecycle of real certificates.

Because applied cryptography lives inside systems, you will explore how signatures are packaged and time-proven in practice, as well as how smart cards protect private keys while still facing risks when endpoints are compromised. You will then dive into TLS, moving from the basic handshake to the changes that enable Perfect Forward Secrecy, gaining clarity on what the browser-server dance is actually achieving. Finally, you will see how Tor’s onion routing design limits what any single relay can learn, and how Bitcoin combines cryptographic primitives and proof-of-work to maintain a decentralized ledger. Throughout, short exercises reinforce your understanding and help you learn to spot insecure assumptions before they ship.

Course content

  • Video class: Welcome to Applied Cryptography @ UT 00m
  • Exercise: What is a key characteristic of an applied cryptography course for IT engineers?
  • Video class: Applied Cryptography: 1. Randomness, PRNG, One-Time Pad, Stream Cipher 55m
  • Exercise: Why does reusing the same key (or keystream) in a one-time pad or stream cipher break security?
  • Video class: Applied Cryptography: 2. Abstract Syntax Notation One (ASN.1) 38m
  • Exercise: Why are Distinguished Encoding Rules (DER) preferred for encoding cryptographic data structures compared to BER?
  • Video class: Applied Cryptography: 3. Hash functions and HMAC 57m
  • Exercise: Which property of a cryptographic hash function enables the binding property in a commitment scheme?
  • Video class: Applied Cryptography: 4. Block ciphers (AES) 55m
  • Exercise: Why is AES used with CBC mode (with a random IV) instead of ECB mode for encrypting larger data such as images?
  • Video class: Applied Cryptography: 5. Public Key Cryptography (RSA) 59m
  • Exercise: What is the key requirement for negotiating a shared secret key over a non-confidential channel using public key cryptography?
  • Video class: Applied Cryptography: 6. Elliptic-curve cryptography (ECC) 48m
  • Exercise: Why must a fresh, secret, and unbiased nonce be used for each ECDSA signature?
  • Video class: Applied Cryptography: 7. Public key certificates (X.509) 57m
  • Exercise: What is the main purpose of a public key certificate in a PKI?
  • Video class: Applied Cryptography: 8. Revocation checking (CRL/OCSP) 50m
  • Exercise: Which field in a CRL is used to check that the CRL is still fresh (i.e., a newer CRL should not yet be required)?
  • Video class: Applied Cryptography: 9. Digital signatures (XAdES) 52m
  • Exercise: Which additional evidence is attached to a qualified electronic signature container to prove the signature existed before the certificate expired or was revoked?
  • Video class: Applied Cryptography: 10. Smart cards (EstEID) 1h16m
  • Exercise: Why did switching from RSA to ECC make on-card key generation much faster on smart cards like the Estonian ID card?
  • Video class: Applied Cryptography: 11. Smart cards (JavaCard) 1h05m
  • Exercise: Why can malware on a compromised computer still cause an unintended signature even when using a smart card reader with a PIN pad?
  • Video class: Applied Cryptography: 12. Transport Layer Security (TLS) Basic 49m
  • Exercise: What is the main purpose of the TLS 1.2 handshake in the simplest RSA-based key exchange?
  • Video class: Applied Cryptography: 13. Transport Layer Security (TLS) Advanced 41m
  • Exercise: In TLS, what change enables Perfect Forward Secrecy (PFS) against passive decryption after the server’s long-term private key is later compromised?
  • Video class: Applied Cryptography: 14. The Onion Router (Tor) 42m
  • Exercise: In Tor onion routing, what prevents a single relay from learning both the client IP address and the final destination?
  • Video class: Applied Cryptography: 15. Bitcoin, Proof-of-Work 47m
  • Exercise: In Bitcoin, what mechanism is used to provide integrity and authenticity of the decentralized transaction log (ledger) without a central authority?

This free course includes:

13 hours and 20 minutes of online video course

Digital certificate of course completion (Free)

Exercises to train your knowledge

100% free, from content to certificate

Ready to get started?Download the app and get started today.

Install the app now

to access the course
Icon representing technology and business courses

Over 5,000 free courses

Programming, English, Digital Marketing and much more! Learn whatever you want, for free.

Calendar icon with target representing study planning

Study plan with AI

Our app's Artificial Intelligence can create a study schedule for the course you choose.

Professional icon representing career and business

From zero to professional success

Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.

You can also use the QR Code or the links below.

QR Code - Download Cursa - Online Courses

More free courses at Cyber Security

Free Ebook + Audiobooks! Learn by listening or reading!

Download the App now to have access to + 5000 free courses, exercises, certificates and lots of content without paying anything!

  • 100% free online courses from start to finish

    Thousands of online courses in video, ebooks and audiobooks.

  • More than 60 thousand free exercises

    To test your knowledge during online courses

  • Valid free Digital Certificate with QR Code

    Generated directly from your cell phone's photo gallery and sent to your email

Cursa app on the ebook screen, the video course screen and the course exercises screen, plus the course completion certificate