Complete Guide to Cryptography:

User Avatar
(0 review)
₹5,000.00 ₹1,999.00


Cryptography is an indispensable tool for protecting information in computer systems. Most of the beginner-level students think of it as a complicated science which deals with complex mathematics.

In this course, I will show you the inner workings of cryptographic systems, explain those mathematics in the most simple way. This course “Basics to Advanced level Cryptography”  will cover up classical cryptography, mechanical cryptography, modern cryptography.


Why take this course?

This is the most updated and simple version of the course. So, if you are starting with cryptography then this course is for you.


I already know the basics, shall I take this course?

If you know the working of the public and private key, classical cryptography then you probably should not take this course.


There are some parts of the course which I didn’t understand, what shall I do?

There is a discussion forum where you can directly write your queries. You can also send me a direct message. If I think I need to add more videos to the course then I will add them from time to time.


Who this course is for:

  • Computer Science students who want to learn about cryptography
  • Developers who want to learn more about the cryptography
  • Physicist and Mathematician who has an interest in cryptography
1 Step 1

Get In Touch With Us

What you find on FindMeMentor PlatformChoose your type

Course Features

  • Lectures 25
  • Quizzes 0
  • Duration 50 hours
  • Skill level All levels
  • Language English
  • Students 28
  • Assessments Yes
  • Introduction 3

    • Lecture1.1
      Introduction to the course 10 min
    • Lecture1.2
      Terminologies 15 min
    • Lecture1.3
      Types of Cryptography
  • Classical Cryptography 4

    • Lecture2.1
      Introduction to Classical Cryptography 15 min
    • Lecture2.2
      Caesar Cipher 15 min
    • Lecture2.3
      Vigenère cipher 17 min
    • Lecture2.4
      Enigma Machine 15 min
  • Symmetric Key Encryption 7

    • Lecture3.1
      Introduction to Symmetric Key Encryption 20 min
    • Lecture3.2
      Data Encryption Standard (DES) 20 min
    • Lecture3.3
      Triple DES
    • Lecture3.4
      Blowfish (cipher)
    • Lecture3.5
      Advanced Encryption Standard (AES)
    • Lecture3.6
      Writing Program for Symmetric Key Encryption
    • Lecture3.7
      Cryptanalysis of Symmetric Key Encryption
  • Asymmetric Key Encryption 6

    • Lecture4.1
      Introduction to Asymmetric Key Encryption 20 min
    • Lecture4.2
      Diffie-Hellman key agreement algorithm
    • Lecture4.3
      RSA 20 min
    • Lecture4.4
      Elliptic Curve Cryptography (ECC)
    • Lecture4.5
      Writing Program for Asymmetric Key Encryption
    • Lecture4.6
      Cryptanalysis of Asymmetric Key Encryption
  • Hashing 3

    • Lecture5.1
      Introduction to Hashing
    • Lecture5.2
      Types of Hashing – MD5, SHA-2, CRC32
    • Lecture5.3
      Writing Program for Hashing
  • Bonus 2

    • Lecture6.1
      External Resources
    • Lecture6.2
      Thank You Note!
author avatar
Prashant is an entrepreneur, author, researcher, and educator. He has done his from KIIT University, masters in Cyber Security from EURECOM, France and post-masters from IIT Delhi in Entrepreneurship. He has previously worked with brands like Google, BMW, etc across the globe. He is also an electric vehicle enthusiast. Prashant has published over 10+ research papers and 1 book. His research paper was awarded the best paper in "Junior Science Congress" by then-president Dr. A. P. J Abdul Kalam.You can book him as a mentor from:


Average Rating

0 rating

Detailed Rating

₹5,000.00 ₹1,999.00

Leave A Reply

Your email address will not be published. Required fields are marked *