In this course, you will break down the concepts behind cryptography into simple lessons, covering terminology, algorithms, standards, and encryption/decryption techniques. We will also walk through how cryptographic systems are hacked to bypass (rather than break) their cryptographic capabilities.
This course focuses on problems, solutions, and examples. Each scenario explains the problem being solved, the role of cryptography used in solving that problem, and then provides a copy-able demonstration of the solution. All examples are self-contained projects with just enough code to be clear, concise, and legible for new to mid-level developers.