Click Here
Experiencing playback issues or need translation options?
Welcome to CS260Introduction to Cryptography and Network Security
My name is Dr Eric Sakk, I’m one of the professors that helped develop this course.” "This course provides an introduction to the field of applied cryptography. This course aims to balance theory, application, and implementation for those new to the field. Topics range from classical techniques involving symmetric and public key cryptography to more immediate topics such as blockchain, zero-knowledge proofs, and quantum cryptography. A rudimentary background in Python and a measure of comfort with basic math concepts are assumed for coding implementations. You can start by reviewing the course learning outcomes and the syllabus, you can find both on the left navigation panel. Let’s get started!
To access the AI Summary of this page or to download the PDF transcript for the video, please click on the icons above.
AI Summary
Video Transcript
Source and License: This work is licensed by Saylor Academy under a Creative Commons Attribution-NonCommercial-Sharealike 4.0 International License (CC BY-NC-SA 4.0). This content was created using Genially and Synthesia. AI-generated avatars and voices in this video were created using Synthesia and remain subject to Synthesia’s Terms of Service; these elements are not covered by the Creative Commons license. Synthesia trademarks and services remain the property of Synthesia. All Genially proprietary elements such as templates, themes, built-in assets, stock media, and other “Genially Content” remain subject to Genially’s Terms of Service and are not covered by this Creative Commons license. These elements must remain embedded in the course and cannot be reused or redistributed independently.
Source and License: This work is licensed by Saylor Academy under a Creative Commons Attribution-NonCommercial-Sharealike 4.0 International License (CC BY-NC-SA 4.0). This content was created using Genially and Synthesia. AI-generated avatars and voices in this video were created using Synthesia and remain subject to Synthesia’s Terms of Service; these elements are not covered by the Creative Commons license. Synthesia trademarks and services remain the property of Synthesia. All Genially proprietary elements such as templates, themes, built-in assets, stock media, and other “Genially Content” remain subject to Genially’s Terms of Service and are not covered by this Creative Commons license. These elements must remain embedded in the course and cannot be reused or redistributed independently.
AI Summary
This course introduces the fundamentals of applied cryptography, balancing theory, application, and implementation. You will explore techniques used to secure information, from classical encryption methods to modern innovations like blockchain and quantum cryptography. Here are some key takeaways:
- Understand core cryptographic concepts, including encryption and decryption.
- Explore symmetric and asymmetric cryptography methods.
- Learn about modern applications such as blockchain and zero-knowledge proofs.
- Develop foundational skills for implementing cryptographic techniques using programming.
You can start by reviewing the course learning outcomes and the syllabus.
Course Introduction Video
Saylor Academy
Created on April 16, 2026
Start designing with a free template
Discover more than 1500 professional designs like these:
View
About Me Infographic
View
Customer Profile
View
Movie Infographic
View
Interactive QR Code Generator
View
Advent Calendar
View
Tree of Wishes
View
Witchcraft vertical Infographic
Explore all templates
Transcript
Click Here
Experiencing playback issues or need translation options?
Welcome to CS260Introduction to Cryptography and Network Security
My name is Dr Eric Sakk, I’m one of the professors that helped develop this course.” "This course provides an introduction to the field of applied cryptography. This course aims to balance theory, application, and implementation for those new to the field. Topics range from classical techniques involving symmetric and public key cryptography to more immediate topics such as blockchain, zero-knowledge proofs, and quantum cryptography. A rudimentary background in Python and a measure of comfort with basic math concepts are assumed for coding implementations. You can start by reviewing the course learning outcomes and the syllabus, you can find both on the left navigation panel. Let’s get started!
To access the AI Summary of this page or to download the PDF transcript for the video, please click on the icons above.
AI Summary
Video Transcript
Source and License: This work is licensed by Saylor Academy under a Creative Commons Attribution-NonCommercial-Sharealike 4.0 International License (CC BY-NC-SA 4.0). This content was created using Genially and Synthesia. AI-generated avatars and voices in this video were created using Synthesia and remain subject to Synthesia’s Terms of Service; these elements are not covered by the Creative Commons license. Synthesia trademarks and services remain the property of Synthesia. All Genially proprietary elements such as templates, themes, built-in assets, stock media, and other “Genially Content” remain subject to Genially’s Terms of Service and are not covered by this Creative Commons license. These elements must remain embedded in the course and cannot be reused or redistributed independently.
Source and License: This work is licensed by Saylor Academy under a Creative Commons Attribution-NonCommercial-Sharealike 4.0 International License (CC BY-NC-SA 4.0). This content was created using Genially and Synthesia. AI-generated avatars and voices in this video were created using Synthesia and remain subject to Synthesia’s Terms of Service; these elements are not covered by the Creative Commons license. Synthesia trademarks and services remain the property of Synthesia. All Genially proprietary elements such as templates, themes, built-in assets, stock media, and other “Genially Content” remain subject to Genially’s Terms of Service and are not covered by this Creative Commons license. These elements must remain embedded in the course and cannot be reused or redistributed independently.
AI Summary
This course introduces the fundamentals of applied cryptography, balancing theory, application, and implementation. You will explore techniques used to secure information, from classical encryption methods to modern innovations like blockchain and quantum cryptography. Here are some key takeaways:
- Understand core cryptographic concepts, including encryption and decryption.
- Explore symmetric and asymmetric cryptography methods.
- Learn about modern applications such as blockchain and zero-knowledge proofs.
- Develop foundational skills for implementing cryptographic techniques using programming.
You can start by reviewing the course learning outcomes and the syllabus.