Why learn cryptography with Flatiron School?
Our cryptography lessons are free — that way you can learn the fundamentals on your schedule and at your own pace.
Our cryptography lessons are a great way to determine if learning cybersecurity is right for you. Discover whether you're passionate about pursuing a cyber career, or if you just want to learn a new skill.
This is the quickest way to get hands-on experience with the fundamentals you'll need to get into our immersive Cybersecurity Engineering course.
Our grads work at some of tech's biggest companies
What you'll learn: Cryptography basics and how they're applied to today's cybersecurity efforts
Our free Introduction to Cryptography for beginners teaches you the basics behind cryptography, cryptology, cryptanalysis, cryptocurrency, and encryption to give you a broad views of how they work together to protect critical information every day.
Learn how HyperText Transfer Protocol Secure compares with regular HTTP and its importance.
Understand how cryptocurrency works and how it could impact the future of cryptography.
Learn the basics behind encryption and how it's critical to protecting our data.
Learn how cryptographic keys — passwords — work and the difference between symmetric and assymetric encryption.
In addition to the Caesar Cipher is cipher-block chaining. Learn how it works in relation to cryptocurrency.
Practice with the simple symmetric substitution called Playfair Cipher, including how to encrypt and decrypt a message using the Playfair Cipher.
Other free cybersecurity tutorials at Flatiron School
Cybersecurity is one of the fastest-growing sectors of the tech industry. But there’s a skills gap – employer demand is rapidly outpacing the supply of highly trained cybersecurity specialists. If you're ready to join the mission to prevent global cybercrime, Flatiron School's Cybersecurity Engineering teaches you everything you need to know to become a cybersecurity professional.
You can also try our other free lessons below to better understand the subjects covered.
Learn about the Internet of Things and how WiFi-enabled devices can leave you vulnerable.Learn IoT Security
If you use email, you've experienced phishing. Learn about its many forms and how to protect yourself.Learn How to Prevent Phishing
Learn about virtualization technology and how it enhances information security.Learn Virtualization