Cryptography
from Zero to PRO
A course for those who want to learn the basics of
cryptography, understand historical and modern
encryption methods and apply them in practice.
In simple terms about
complex concepts
Topical
materials
Practical
assignments
We teach with
examples
What is cryptography?
Cryptography is the science of protecting information
using encryption. It ensures confidentiality, data integrity,
and secure communications.

With the development of digital technologies, the demand
for cryptographers and cybersecurity specialists is growing.
Knowledge of cryptography opens doors to IT security, blockchain, secure systems development and government agencies.
Who this course is for
Programmers
Deepen your knowledge of encryption algorithms to create more secure applications.
Information Security
Engineers
Master the fundamental principles
of cryptography to securely
protect your data.
Data Protection
Specialists
Learn how to apply cryptographic
techniques to securely store
and transmit information.
Anyone who wants
to understand encryption
Understand how ciphers work and learn how to use them in your everyday digital life.
What you will learn
on the course
Understand ciphers
Master the principles of cryptography
behind modern blockchain technologies
and end-to-end encryption systems.
Work with XOR, N-grams,
bigram ciphers
Learn to apply these techniques
to symmetric and asymmetric
encryption systems.
Apply Caesar, Vigenère, Enigma,
and other ciphers
Understand how classical algorithms have
influenced the development of modern
cryptographic protocols.
Conduct frequency analysis
and analyze ciphers
Learn how to identify vulnerabilities in
cryptosystems, which is critical for
developers of secure solutions.
Understand the basics
of cryptanalysis
Gain skills to evaluate the strength
of algorithms used in TLS, VPN and other
current data protection technologies.
How you will learn
Study in a style
that suits you.
You can study at any time
and you will have access
to the learning materials
at all times.
Materials are available
24 hours a day.
All learning materials are
available 24 hours a day, 7 days
a week. You choose when and
how much time to study.
Do practical
assignments
Put your theoretical
knowledge into
practice by working
on real projects.
Get feedback
Your tutor will check your
assignment and send you
a detailed review. If you have
any questions, you can ask
them directly in the chat.
Course instructors
and supervisors
Andrei Efimov
Cryptographer at Kaspersky Lab

Deepen your knowledge of encryption
algorithms to create more secure applications.
Elena Smirnova
Head of Cyber Security at SberTech

Expert in financial data protection
and blockchain technologies.
Dmitry Scholz
Security Architect at Yandex.Cloud

Deepen your knowledge of encryption
Develops cryptographic protocols for cloud services.
Olga Zarya
Cryptanalyst

Educator with experience in
government information protection.
Ivan Gromov
CTO of a startup in the field
of quantum cryptography

Researches post-quantum
encryption algorithms.
Anastasia Belova
Penetration Tester
at Positive Technologies

Conducts security audits
and cipher cracking.
Mikhail Orlov
Developer of TLS protocols
in Mail.ru Group

Specialist in cryptography
in web security.
Course Program
Module 1: Fundamentals of
Cryptography and Cryptanalysis
  • What is cryptography
  • What is cryptanalysis
  • Classification of cryptographic systems
  • Alice, Bob, Eve and other characters of cryptography
  • Mathematical problems of encryption and decryption
  • The sequence of work of a cryptanalyst
Module 2: Basic
Terminology
  • Information
  • Cipher alphabet and ciphergram
  • Rossignol Doctrine
  • Kerckhoffs Principle
  • Operation XOR
  • Gamification
Module 3: Simple
Substitution Cipher
  • Simple substitution cipher
  • Frequency analysis
  • Keyword analysis
  • Is a simple substitution cipher a cipher system
Module 4:
Bigram Cipher
  • N-grams
  • Bigram cipher
  • Attack on bigram cipher
Module 5: Multi-alphabetic
Substitution Cipher
  • Multi-alphabetic substitution cipher
  • Attack on multi-alphabetic substitution cipher
  • Another variant of the polyalphabetic cipher
Module 6: Proportional
Substitution Cipher
  • Proportional substitution cipher
  • A method of attacking the proportional substitution cipher
Module 7:
One-time Pad
  • One-time pad
  • Why you can't use the same key
  • Attack on the one-time pad
  • Key distribution problem
Module 8: The Enigma
Cipher Machine
  • Enigma
  • How to make a model of Enigma out of paper
  • The second version of Enigma paper model
  • Principles of Enigma encryption
Module 9:
Nomenclators
  • Nomenclators
Module 10: Examples
of Substitution Cipher Systems
  • Aeneas disk
  • Aeneas ruler
  • Polybius' square
  • Caesar's Cipher
  • Vigenère's cipher
  • The Book Cipher
  • Chess cipher
  • The Great Cipher
  • Lithorea simple and wise
Bonus
  • How to code the Baroque Cycle in one stroke
We offer competitive rates
Introductory
  • 2 sections
  • 12 video lessons
  • No feedback
  • Open Access
  • No certificate
$30
CHECKOUT
Basic
  • 10 sections
  • 42 video lessons
  • Practice assignments
  • No feedback
  • Access: 2 months
  • Certificate
$59
CHECKOUT
Standard
  • 10 sections
  • 42 video lessons
  • Practice assignments
  • Assignment Review and Feedback
  • Chat with tutors and students
  • Access: 6 months
  • Certificate
$78
CHECKOUT
Standard Plus
  • 10 sections
  • 42 video lessons
  • Bonus: app
  • Practical assignments
  • Personalized support from a mentor
  • Error analysis and feedback
  • Chat with students and mentors
  • Access: 12 months
  • Certificate
$99
CHECKOUT
Corporate Plan
  • Groups of 5-10 people
  • 10 sections
  • 42 video lessons
  • Bonus: app
  • Practical assignments
  • Error analysis and feedback
  • Group chat
  • Mentor Chat
  • Access: 12 months
  • Certificate
$750
CHECKOUT
A certificate to prove
your skills
Upon successful completion of the course, you will receive
an official certificate that will validate your knowledge of
cryptography and give you an advantage in employment.
4 reasons to master
cryptography right now
Explosive growth
in cyberattacks
With hackers attacking
banks, corporations, and
government agencies every
day, the demand for data
protection is higher than ever.
Blockchain and
Web3 boom
NFT, DeFi and
meta-universes require
cryptographers to develop
secure algorithms and smart
contracts.
Tough data
protection laws
GDPR, FZ-152 and new
regulations oblige companies
to encrypt data - you can't do
without experts.
Quantum
Breakthrough
Quantum computers will
break old ciphers - the world
is urgently moving to post-
quantum cryptography.
Money back guarantee if the
course is not suitable
We are confident in the quality of our training
and offer you the option of a refund at any time.
Testimonials from our students
anna data analyst
Took the course to broaden my horizons and ended up getting seriously interested in cryptanalysis. The practice with frequency analysis is just a bomb! A special plus - actual examples from real cases of companies.
MARIA backend developer
I never thought that cryptography could be so fascinating! The course is perfectly structured. I am now implementing basic encryption in my projects. The certificate helped in my transition to a fintech company.
Alexey cybersecurity engineer
The course completely changed my understanding of encryption. Especially useful were the practical tasks on breaking and creating ciphers - now I apply this knowledge in my work. The instructors explain complex things in simple language!
Ivan startup founder
I was looking for a short but concise course on the basics of cryptography for product protection. I got even more: understanding of vulnerabilities, principles of key generation and advice on choosing algorithms. The only thing is that I would have liked more material on blockchain applications.
Dmitry IT student
As a beginner, I found the first modules a bit difficult, but the tutors promptly helped me to understand. I liked the sections on Vigenère cipher and quantum cryptography the most.
Frequently Asked Questions
Who teaches the course?
All our instructors are practicing experts in cryptography and information security from leading IT companies and research centers.
How much time do I need
to devote to the course?
The program is designed for comfortable study. On average, students spend 6-8 hours per week, including watching lectures and completing practical assignments.
Can I apply knowledge from
the course in real projects?
Absolutely! Our course is based on practical cases from modern cryptography. You will be able to apply the knowledge gained immediately.
How is the learning process organized?
The training is fully online and includes:
  • Video lectures with theory review
  • Practical assignments with real cases
  • Personalized review of work by instructors
  • Access to training materials 24/7
Where will I be able
to work after the course?
Cryptography is a skill that is valued in any IT field. After completing the course you will be able to apply for positions in the most sought-after IT and security fields: cybersecurity, cryptographer, transaction security specialist, software development, government and corporate organizations, consulting and auditing.