{"id":27223,"date":"2020-12-18T19:37:27","date_gmt":"2020-12-19T03:37:27","guid":{"rendered":"https:\/\/careerkarma.com\/blog\/?p=27223"},"modified":"2021-01-11T07:46:47","modified_gmt":"2021-01-11T15:46:47","slug":"cryptography","status":"publish","type":"post","link":"https:\/\/careerkarma.com\/blog\/cryptography\/","title":{"rendered":"How to Learn Cryptography and Discover the Key to Secure Communication"},"content":{"rendered":"\n<p>One cryptography course might be all it takes to convince you that cryptography is as cool as it sounds. Perhaps it was the word crypt that reeled you in, or maybe you think that learning about secret keys, hidden messages, and encryption algorithms will help you find a career pathway for your <a href=\"https:\/\/careerkarma.com\/blog\/problem-solving-skills\/\">problem-solving skills<\/a>. Whatever the case, we\u2019re here to help.<br><\/p>\n\n\n\n<p>Whether or not you believe <a href=\"https:\/\/careerkarma.com\/blog\/is-computer-science-hard\/\">you can succeed in computer science<\/a>, learning cryptography doesn\u2019t have to be scary. In this guide, we\u2019ll look at the field from all angles, help you chart a personal course for acquiring the knowledge, and point you towards some awesome courses and resources that just might hold the key to your future.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Cryptography?<\/h2>\n\n\n\n<p>Cryptography is the art of creating codes for sharing valuable information with desired parties while eluding undesired parties. From a Greek root that roughly means hidden writing, cryptography has been practiced continuously since antiquity. Its modern form has developed in tandem with advances in math and computer science.<br><\/p>\n\n\n\n<p>Cryptography and its sister field of cryptanalysis are two sides of the same coin. While cryptographers work with ciphers and algorithms to convert the <em>plain text<\/em> of something into <em>ciphertext<\/em>, a process known as encryption, cryptanalysts study the process of converting ciphertext back to plain text, called decryption. Cryptology is the parent field of both.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Is Cryptography Used For?<\/h3>\n\n\n\n<p>Whenever people, organizations, and businesses need to keep their information safe from malicious attacks, cryptography is one of the first tools they use. In the age of the Internet especially, digital messages sent on the information superhighway are vulnerable to hackers, who can steal the highly precious cargo of valuable data without ever breaking a sweat.<br><\/p>\n\n\n\n<p>As the data that makes up our lives shifts ever more online, so the data security applications of cryptography continue to grow. Below are four major ways that cryptography helps keep us and our data secure in the modern world.&nbsp;<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Secure communication.<\/strong> For Julius Caesar, it was physical letters carrying military strategy between him and his generals. For us, it\u2019s <a href=\"https:\/\/faq.whatsapp.com\/general\/security-and-privacy\/end-to-end-encryption\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">end-to-end encrypted WhatsApp messages<\/a> containing sensitive information. That, or <a href=\"https:\/\/www.forbes.com\/sites\/gregsatell\/2016\/02\/07\/the-technology-behind-hillary-clintons-email-scandal-explained\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">emails containing state secrets<\/a>.&nbsp;<\/li><li><strong>Information security. <\/strong>This is a massive area of interest for modern cryptographers, covering both data security and data storage. Encryption techniques deployed to protect data must ensure <a href=\"https:\/\/csoonline.com\/article\/3519908\/the-cia-triad-definition-components-and-examples.html\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">confidentiality, integrity, and availability<\/a>.&nbsp;<\/li><li><a href=\"https:\/\/careerkarma.com\/blog\/ecommerce\/\"><strong>eCommerce<\/strong><\/a><strong>. <\/strong>Not too long ago, <a href=\"https:\/\/newsweek.com\/clifford-stoll-why-web-wont-be-nirvana-185306\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">public intellectuals were betting against the Internet<\/a>, arguing that transferring money over the web would never be secure. Well, look at us now. The big encryption breakthrough was <a href=\"https:\/\/bigcommerce.com\/ecommerce-answers\/what-ssl\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">SSL<\/a>, and the rest is history.&nbsp;<\/li><li><strong>Digital signatures. <\/strong>This encryption technology forms the backbone of identity authentication for some of the most valuable kinds of digital information. Parties to an official document can now set terms from afar without fear of fraud.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Types of Cryptography<\/h3>\n\n\n\n<p>To list every form of secret writing ever conceived is a daunting task. Luckily for me, other websites have already done the brilliant work of compiling <a href=\"https:\/\/cryptogram.org\/resource-area\/cipher-types\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">the classical ciphers<\/a> and <a href=\"https:\/\/globalsign.com\/en\/blog\/glossary-of-cryptographic-algorithms\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">the modern cryptographic algorithms<\/a> all in one place, so I don\u2019t have to.&nbsp;<br><\/p>\n\n\n\n<p>Students of the modern version will be relieved to know that computer science has managed to organize almost all of these ciphers and algorithms into three major types. These are secret-key cryptography, public-key cryptography, and one-way cryptography.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Secret-Key Cryptography<\/h4>\n\n\n\n<p>Also known as symmetric-key cryptography or simply symmetric cryptography, this type involves an encrypted message shared between two parties and a single key that both sender and receiver have access to. Thus, the sender scrambles her message using the same key to encrypt that the receiver on the other end will eventually use for decryption.&nbsp;<br><\/p>\n\n\n\n<p>One huge limitation of using one key for both encryption and decryption is that, if the two parties are reduced to communicating in secret, they would at some point have had to figure out a secure way to exchange the key. Any key forced to pass through the same transit route as the message is equally vulnerable to exposure.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Public-Key Cryptography<\/h4>\n\n\n\n<p>Public-key cryptography circumvents the key exchange problem with the addition of a second key. Because different keys are used for encryption and decryption, this type is also called asymmetric cryptography. Another way to understand the asymmetry is that one key is kept private and the other key is public but can afford to be exposed.<br><\/p>\n\n\n\n<p>Each person in the network has a public and private key, the former for encryption and the latter for decryption. You open a line of communication with someone by sending them your public key, which they can use whenever they want to send you an encrypted message. If someone steals the message, it won\u2019t matter, because only your private key can decrypt it.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">One-Way Cryptography<\/h4>\n\n\n\n<p>The most common form of one-way cryptography is a hash function. Once encrypted, a one-way cryptographic message is virtually impossible to decrypt. At first glance, this would seem to be of limited value, but it is more useful than you might imagine.<br><\/p>\n\n\n\n<p>A hash function leaves behind a digital trace, which can keep passwords safe and ensure data integrity. If a company uses a hashing algorithm to store all its passwords in scrambled form, they will be useless to any hacker who manages to penetrate a system. And a hacker can\u2019t manipulate someone\u2019s data in transit if there\u2019s a hashed record of it somewhere.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Learning Cryptography<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"611\" src=\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-4.jpg\" alt=\"Two-dimensional map of the world on crumpled paper, with all of the continents in blue and the oceans in white, overlaid with an image of a translucent gold padlock. \" class=\"wp-image-27225\" srcset=\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-4.jpg 1020w, https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-4-768x460.jpg 768w, https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-4-770x461.jpg 770w, https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-4-385x231.jpg 385w, https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-4-20x12.jpg 20w\" sizes=\"auto, (max-width: 1020px) 100vw, 1020px\" \/><figcaption>Ironic though it may be, you don\u2019t need a secret key to unlock a world of encryption methods.&nbsp; <\/figcaption><\/figure>\n\n\n\n<p>When some people first learn what cryptography is, their mind immediately jumps to secret societies, impenetrable passwords, and arcane knowledge. But in reality, the field is much less exotic and much more hospitable than the name and subject matter imply.<br><\/p>\n\n\n\n<p>As far as <a href=\"https:\/\/careerkarma.com\/blog\/stem\/\">STEM fields<\/a> go, cryptography is actually pretty tame. Still not sure you buy that? Let\u2019s take a step back and examine, piece by piece, what it takes to learn cryptography.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How Long Does It Take to Learn Cryptography?<\/h3>\n\n\n\n<p>Solving puzzles takes time. That\u2019s even more true when the puzzle you\u2019re trying to solve is how to create puzzles. But thanks to the elegance of the ciphers and encryption techniques already in circulation, you have plenty of models to help you speed up the process.&nbsp;<br><\/p>\n\n\n\n<p>Furthermore, because cryptographers understand that information security is one of the most pressing issues facing humanity in the 21st century, they tend to publish their findings at low cost to readers and students. You don\u2019t have to waste precious resources enrolling in degree programs or buying expensive books to learn cryptography.<br><\/p>\n\n\n\n<p>With <a href=\"https:\/\/careerkarma.com\/blog\/analytical-skills-for-resume\/\">an array of analytical skills<\/a> and a will to learn coding, you can pick up both the science and the art of cryptography in less than two years. To grasp advanced topics in quantum and post-quantum cryptography, you\u2019ll probably want to tack on however many years it takes to <a href=\"https:\/\/careerkarma.com\/blog\/quantum-computing\/\">learn quantum computing<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to Learn Cryptography: A Step-by-Step Guide<\/h3>\n\n\n\n<p>No matter how steep your learning curve, the path to becoming an expert in cryptography consists of four unskippable steps.<br><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Dust off your high-school level math. <\/strong>You read that right. Chances are you\u2019ve already studied all the math you need to learn cryptography. The field mostly leans on basic algebra, with added support from prime numbers and probability theory.<\/li><li><strong>Study the obstacles to secure communication and the encryption methods used to overcome them. <\/strong>Cryptography courses usually begin with a set of thought experiments featuring an encrypted message and two parties, a sender and receiver. For any given message, cryptographers need to analyze the communication situation and determine which symmetric or asymmetric encryption technique will most efficiently fulfill the minimum <a href=\"https:\/\/csoonline.com\/article\/3513899\/what-is-information-security-definition-principles-and-jobs\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">requirements for information security<\/a>.<\/li><li><a href=\"https:\/\/careerkarma.com\/blog\/learn-to-code-guide\/\"><strong>Learn how to code<\/strong><\/a><strong> and pick a programming language.<\/strong> Because modern cryptography is a subfield of computer science, you need to know your way around computers. If you\u2019re new to programming, try Python. Not only is it easy to learn, but coding beginners often turn to cryptography for <a href=\"https:\/\/careerkarma.com\/blog\/python-projects-beginners\/\">Python project ideas<\/a>.&nbsp;<\/li><li><strong>Start applying cryptographic algorithms to your desired use case. <\/strong>Whatever you want to secure, you\u2019re now ready to begin generating and implementing symmetric keys using algorithms like the Advanced Encryption Standard (AES) or Blowfish, or playing around with asymmetric keys using the RSA algorithm.&nbsp;<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">The Best Cryptography Courses and Training<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"765\" src=\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-1-1.jpg\" alt=\"In a computer lab, a woman wearing a blue shirt types on her laptop, with a second monitor displaying a portion of her work in the background.\" class=\"wp-image-27226\" srcset=\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-1-1.jpg 1020w, https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-1-1-768x576.jpg 768w, https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-1-1-770x578.jpg 770w, https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-1-1-20x15.jpg 20w, https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/image-1-1-385x289.jpg 385w\" sizes=\"auto, (max-width: 1020px) 100vw, 1020px\" \/><figcaption>Students can find great cryptography courses wherever computer science is taught.&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>The best way to streamline your learning process is to take a cryptography course. Despite its ancient origins and obvious benefits to society, the modern field of cryptography largely operates outside of formal institutional structures. Computer science departments do sometimes wade into cryptography, but the most consistent training is found online.<br><\/p>\n\n\n\n<p>This means that a high-quality education in cryptography is just a few clicks away. Whether you\u2019re starting at a beginning, intermediate, or advanced level, you can find the right combination of cryptography courses to unlock your learning potential.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Best Live or In-Person Cryptography Courses<\/h3>\n\n\n\n<p>Though less common since the onset of the COVID-19 pandemic, live cryptography courses still offer students the best opportunity to stamp this increasingly prized skill set on their r\u00e9sum\u00e9s in the form of certification. The two courses featured below, while not for the faint of heart, will put you on an accelerated track to learn cryptography.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">TrainACE&nbsp;<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Name: <\/strong><a href=\"https:\/\/trainace.com\/products\/eces-training-and-certification\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">Certified Encryption Specialist Training<\/a>&nbsp;<\/li><li><strong>Location: <\/strong>Ashburn, VA or Greenbelt, MD&nbsp;<\/li><li><strong>Time: <\/strong>3 days, dates TBA<\/li><li><strong>Prerequisites: <\/strong>Background in computer science&nbsp;<\/li><li><strong>Cost: <\/strong>$1,995<\/li><\/ul>\n\n\n\n<p>This crash course is geared toward preparing you to ace the ECES exam and become a Certified Encryption Specialist, one of the many certifications that EC-Council offers. Short for International Council of E-Commerce Consultants, EC-Council is an organization that trains cryptographers to fend off the next big threat to global cyber security.<br><\/p>\n\n\n\n<p>Even if you have no ambition to save the world, certification is an efficient way to learn all the encryption techniques favored by professional cryptographers. This course drills down on the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), as well as asymmetric key standards like RSA.<br><\/p>\n\n\n\n<p>But more than just a glorified cramming session, the training funnels all this knowledge into a practical project. At the end of day three, you will use everything you have learned about protecting data and information to set up your own virtual private network (VPN).&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Edureka!<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Name: <\/strong><a href=\"https:\/\/edureka.co\/cybersecurity-certification-training\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">Cyber Security Certification Course<\/a>&nbsp;<\/li><li><strong>Location: <\/strong>Virtual classroom&nbsp;<\/li><li><strong>Dates: <\/strong>4 weekends starting January 8<\/li><li><strong>Prerequisites: <\/strong>None<\/li><li><strong>Cost: <\/strong>$260&nbsp;<\/li><\/ul>\n\n\n\n<p>Edureka\u2019s certification course is a blunter training tool than its EC-Council counterpart, which you can tell by its substantially lower price. As the title of the course suggests, moreover, it is also less focused. In addition to the basic tenets of cryptography, it covers other subtopics in cyber security, including ethical hacking, vulnerability analysis, and session hijacking.&nbsp;<br><\/p>\n\n\n\n<p>If you\u2019re considering trying to <a href=\"https:\/\/careerkarma.com\/careers\/cybersecurity\/\">become a cyber security engineer<\/a>, then this may be just what you\u2019re after. Even if it\u2019s not, the cryptography module could still be worth the price of admission. There you\u2019ll get a rundown of every type of cryptography, including hash functions, and learn the ins and outs of digital signatures.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Best Online Cryptography Courses<\/h3>\n\n\n\n<p>Asynchronous online courses are the sweet spot of 21st-century education in cryptography. This is mainly because instructors have figured out an ideal balance of lessons and labs, which can be designed in advance and delivered remotely. Live meetings are not nearly as valuable as well-crafted tutorials and well-constructed practice problems.<br><\/p>\n\n\n\n<p>The two online courses we\u2019ve chosen for you are affordable and popular. Add one or both to your study plan and you\u2019ll be generating cryptographic algorithms in no time.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Stanford University (Coursera)<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Name: <\/strong><a href=\"https:\/\/coursera.org\/learn\/crypto\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">Cryptography I<\/a><\/li><li><strong>Time: <\/strong>7 weeks<\/li><li><strong>Prerequisites: <\/strong>None&nbsp;<\/li><li><strong>Cost: <\/strong>$79 with certificate<\/li><\/ul>\n\n\n\n<p>This course was created by Stanford Professor Dan Boneh, who literally wrote the book on applied cryptography. Okay, he wrote one of many <a href=\"https:\/\/schneier.com\/books\/applied-cryptography\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">influential books on the subject<\/a>, but unlike the others, <a href=\"https:\/\/toc.cryptobook.us\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">Boneh\u2019s is free<\/a>. The point is that Boneh, one of the most decorated scholars of cryptography, is quite generous with his knowledge.<br><\/p>\n\n\n\n<p>Although you can access the course materials for free, $79 pays for the privilege to earn an official certificate of completion, which you can get by completing all of the assignments and passing the final exam. Boneh moves quickly and covers a lot of ground, but his engaging teaching style will elucidate all the tricky parts of secret-key and public-key cryptography.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Udemy&nbsp;<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Name: <\/strong><a href=\"https:\/\/udemy.com\/course\/learn-modern-security-and-cryptography-by-coding-in-python\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">Master Modern Security and Cryptography by Coding in Python<\/a><\/li><li><strong>Time: <\/strong>7.5 hours of self-paced learning&nbsp;<\/li><li><strong>Prerequisites: <\/strong>Basic Python understanding and basic math<\/li><li><strong>Cost: <\/strong>Price varies<\/li><\/ul>\n\n\n\n<p>You can\u2019t do much with cryptography unless you know how to code. The sooner you <a href=\"https:\/\/careerkarma.com\/blog\/how-to-learn-python\/\">learn Python<\/a>, the sooner you\u2019ll be ready to speed through Rune Thomsen\u2019s masterclass in using Python to implement strong ciphers and avoid weak ones.<br><\/p>\n\n\n\n<p>While the meat of Thomsen\u2019s course is its dozens of hands-on exercises, you won\u2019t miss out on the larger conceptual framework. He contextualizes every encryption technique in terms of its real-world function, opening your eyes to a wider world of secure communication than you ever knew existed.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Best Free Cryptography Courses<\/h3>\n\n\n\n<p>A surprising number of cryptography instructors offer their online course materials free of charge. They usually come with some sort of catch, but don\u2019t let that stop you from taking advantage. You can cobble together a solid training regimen with just the two classes below.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/careerkarma.com\/blog\/khan-academy-review\/\">Khan Academy&nbsp;<\/a><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Name: <\/strong><a href=\"https:\/\/khanacademy.org\/computing\/computer-science\/cryptography\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">Computer Science: Cryptography<\/a><\/li><li><strong>Time: <\/strong>Self-paced and on-demand&nbsp;<\/li><li><strong>Prerequisites: <\/strong>None<\/li><li><strong>Cost: <\/strong>FREE<\/li><\/ul>\n\n\n\n<p>Part of Khan Academy\u2019s three-part course on computer science, this unit explores the wonders of ancient and modern cryptography with an alternating series of video lessons and interactive challenges. The biggest wonder of all, perhaps, is that none of it costs a thing.<br><\/p>\n\n\n\n<p>Come for content about Julius Caesar and other pioneers of the cryptographic art, but stay for the detailed tutorials about why some situations require public and private keys. There are also helpful appendices on modular arithmetic, prime numbers, and probability, the three areas of mathematics that aspiring cryptographers should study.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Udacity&nbsp;<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Name: <\/strong><a href=\"https:\/\/udacity.com\/course\/applied-cryptography--cs387\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">Applied Cryptography<\/a><\/li><li><strong>Time: <\/strong>About 2 months&nbsp;<\/li><li><strong>Prerequisites: <\/strong><a href=\"https:\/\/udacity.com\/course\/intro-to-programming-nanodegree--nd000\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">Intro to Programming<\/a><\/li><li><strong>Cost: <\/strong>FREE<\/li><\/ul>\n\n\n\n<p>You wouldn\u2019t necessarily expect to find a course on Applied Cryptography for free, but it\u2019s deals like this that help to explain <a href=\"https:\/\/careerkarma.com\/blog\/udacity-review\/\">why Udacity earns such rave reviews<\/a>. Categorized as advanced, this particular course contributes to Udacity\u2019s larger strategy to draw customers toward its nanodegree programs, in this case, the Intro to Programming series.<br><\/p>\n\n\n\n<p>But there are also plenty of ways to <a href=\"https:\/\/careerkarma.com\/blog\/how-to-learn-to-code-for-free\/\">learn how to code for free<\/a>, so don\u2019t let the suggested prerequisites deter you from signing up. Just be aware that this course only spends two of its seven lessons on predigital ciphers and symmetric-key cryptography. The last five units focus on theoretical and applied topics in asymmetric encryption.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Best Cryptography Books<\/h2>\n\n\n\n<p>Cryptography courses are not the only way to learn cryptography. Because so much of modern life depends on cryptography, because the history of encryption and decryption is so compelling, and because <a href=\"https:\/\/careerkarma.com\/blog\/mathematics-for-computer-science\/\">the math behind computer science<\/a> is relatively simple to explain in written form, the market for books on cryptography is teeming with great reads.<br><\/p>\n\n\n\n<p>There are many in-depth and technical treatments of the subject available for free online, such as <a href=\"https:\/\/garykessler.net\/library\/crypto.html\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">Gary Kessler\u2019s landmark overview<\/a>. In this section, we\u2019ll focus instead on a complimentary pair of books written for a broader audience, which do an excellent job of explaining cryptography and assessing its impact.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><em>The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography<\/em>, By Simon Singh<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/sAECXUEobOrrgfy94G1rqUwGcV2dGBPRGFrm0EGY--_DLd9FUw0Fr-Qopny73WpIiXSpKHlrn8383C81Fxgk1uUIq7-BhTpmp8OY3MNNyQ8R6xWIZg0s3Rkv2AERZSR6xbRQO4eW\" alt=\"\"\/><\/figure>\n\n\n\n<p>Author Simon Singh, perhaps best known for his role in <a href=\"https:\/\/youtube.com\/watch?v=qiNcEguuFSA\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">popularizing one of the most legendary puzzles in mathematics<\/a>, brings his knack for storytelling to this epic history of cryptography. Over the span of 432 gripping pages, <a href=\"https:\/\/amazon.com\/Code-Book-Science-Secrecy-Cryptography\/dp\/0385495323\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\"><em>The Code Book<\/em><\/a> draws a straight line from the origins of secure communication to its modern, more sophisticated equivalents.<br><\/p>\n\n\n\n<p>Though what Singh calls the science of secrecy is almost as old as language itself, he devotes more than half the book to the period since the Second World War, during which time encryption techniques have really blossomed. So if you\u2019re only interested in computer science and data security, feel free to skip ahead to the last three chapters.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><em>The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption<\/em>, By Joshua Holden<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/aFuNHICBkanhpaFLUdb_or9cxKD8CUnIm0Kq5yBqzb6Iq1yffj-fPt9M9f44rmix_L1QOJTV0bbakKBzdkDL3OO_9yE9xiHDUZ7MP6s0SS8sbTix5Z82dcskwuO1k4gJY62CD9n3\" alt=\"\"\/><\/figure>\n\n\n\n<p>Readers should consider Joshua Holden\u2019s <a href=\"https:\/\/amazon.com\/Mathematics-Secrets-Cryptography-Ciphers-Encryption\/dp\/0691183317\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\"><em>The Mathematics of Secrets<\/em><\/a><em> <\/em>as <em>The Code Book<\/em>\u2019s more technical cousin, with detailed mathematical explanations of each cipher layered onto the historical account. But far from trying to scare you with the math bogeyman, Holden insists that the math necessary to learn cryptography is easy for beginners to grasp.<br><\/p>\n\n\n\n<p>Sure, cryptography has grown more complicated over the years, but that\u2019s what makes Holden\u2019s chronological method so satisfying. By starting with Julius Caesar\u2019s simple cipher, proceeding methodically through each innovation, and finally exploring the quantum and post-quantum future of cryptography, it feels like you\u2019re completing an exciting quest.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Best Online Cryptography Resources<\/h2>\n\n\n\n<p>Cryptographers often refer to their field as both a science and an art. Now, any of the cryptography courses or books listed above will give you a solid baseline knowledge of the science. To take the next step, you\u2019ll want to not only stay abreast of recent advances on the science side but also practice the art of cryptography on a regular basis.<br><\/p>\n\n\n\n<p>With that in mind, you should reserve a bookmark on your browser and space in your schedule for each of the following resources. Your grasp of cryptography will be all the more well-rounded for having done so.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Schneier on Security: Crypto-Gram Newsletter<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/s3m-OEgo02M9pva57FBCMvgqW_E91uQTxVuRTAntkZTT5FadHCbymzwmENF07BAzXBiqvqYc5a0q7tuz9HQmk7msXXimhP70y94kubg8XdQKezv7uD3OV2os-RCl8UbvZUaRiIMj\" alt=\"\"\/><\/figure>\n\n\n\n<p>For the past thirty years, Bruce Schneier has contributed his valuable perspective to the newest breakthroughs in encryption algorithms, the field\u2019s public policy implications, and the constant tension between information technology and the right to privacy. Knowing his take on a given issue has become something of a rite of passage for aspiring cryptographers.&nbsp;<br><\/p>\n\n\n\n<p>By subscribing to his <a href=\"https:\/\/schneier.com\/crypto-gram\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">Crypto-Gram Newsletter<\/a>, you can have his latest thoughts delivered straight to your inbox. Or, if you prefer to keep your engagement tethered to the domain of computer science, just use the search function on his <a href=\"https:\/\/schneier.com\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">main blog<\/a> to explore the archive of essays and blog posts he\u2019s written about topics in applied cryptography.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CryptoLab<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/RFtdFQJMAClf_tEAAZibjMf06sWEt4Ak6pPJpDWDEmi9wMgp44Ojoj6w2cuHIHKWdUGUplS8yFv75XHFrNxc80D8BVOP_zY-fIllr3adEvO2hSrgwhcFvmh68-peHbqzss4zpaxb\" alt=\"\"\/><\/figure>\n\n\n\n<p>The website doesn\u2019t look like much, but that\u2019s okay because you don\u2019t have to <a href=\"https:\/\/careerkarma.com\/blog\/what-is-ux-ui-design\/\">know anything about UX\/UI design<\/a> to become a cryptographer. And while <a href=\"https:\/\/manansingh.github.io\/Cryptolab-Offline\/\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">CryptoLab<\/a> is light on frills, it is heavy on ways to test your skill at converting any plain text to ciphertext.<br><\/p>\n\n\n\n<p>Most pages on CryptoLab have two tabs, one for explaining a given encryption technique and a second for the tool itself. Work your way through predigital methods like the Caesar cipher and Morse code, move on to the stream ciphers and block ciphers used in symmetric key cryptography, and then finish with three tutorials on public keys and hashes.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Should You Study Cryptography?<\/h2>\n\n\n\n<p>Some folks might decide to learn cryptography based on the coolness factor alone. Others might be hard-pressed to believe that a slate of cool courses will necessarily translate to a cool career. The most important thing is that you understand what\u2019s at stake in the decision.&nbsp;<br><\/p>\n\n\n\n<p>The fact remains that we\u2019re living in an era of data security. If you ever feel the urge to <a href=\"https:\/\/careerkarma.com\/careers\/information-security-analyst\/\">become an information security analyst<\/a>, or if you\u2019re ever faced with a challenging set of <a href=\"https:\/\/careerkarma.com\/blog\/cyber-security-interview-questions\/\">cyber security interview questions<\/a>, a deep knowledge of cryptography will definitely be of service to you.&nbsp;<br><\/p>\n\n\n\n<p>But no matter your career path, it\u2019s up to you to decipher your future.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"One cryptography course might be all it takes to convince you that cryptography is as cool as it sounds. Perhaps it was the word crypt that reeled you in, or maybe you think that learning about secret keys, hidden messages, and encryption algorithms will help you find a career pathway for your problem-solving skills. Whatever&hellip;","protected":false},"author":96,"featured_media":27224,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[50470],"tags":[],"class_list":{"0":"post-27223","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech-guides"},"acf":{"post_sub_title":"","sprint_id":"","query_class":"how to learn {subject}","school_sft":"","parent_sft":"","school_privacy_policy":"","has_review":null,"is_sponser_post":"","is_guest_post":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Learn Cryptography: Best Online Courses and Resources<\/title>\n<meta name=\"description\" content=\"This guide covers the basics of learning cryptography. Master the art of creating ciphers with a list of cryptography course suggestions, book recommendations, and online resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/careerkarma.com\/blog\/cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Learn Cryptography and Discover the Key to Secure Communication\" \/>\n<meta property=\"og:description\" content=\"This guide covers the basics of learning cryptography. Master the art of creating ciphers with a list of cryptography course suggestions, book recommendations, and online resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/careerkarma.com\/blog\/cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"Career Karma\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/careerkarmaapp\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-19T03:37:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-11T15:46:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/internet-3563638_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1020\" \/>\n\t<meta property=\"og:image:height\" content=\"529\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marc Juberg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@career_karma\" \/>\n<meta name=\"twitter:site\" content=\"@career_karma\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marc Juberg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/\"},\"author\":{\"name\":\"Marc Juberg\",\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c3748f7ff9e164de94652f991719917\"},\"headline\":\"How to Learn Cryptography and Discover the Key to Secure Communication\",\"datePublished\":\"2020-12-19T03:37:27+00:00\",\"dateModified\":\"2021-01-11T15:46:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/\"},\"wordCount\":3353,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/internet-3563638_1280.jpg\",\"articleSection\":[\"Tech Guides\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/\",\"url\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/\",\"name\":\"Learn Cryptography: Best Online Courses and Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/internet-3563638_1280.jpg\",\"datePublished\":\"2020-12-19T03:37:27+00:00\",\"dateModified\":\"2021-01-11T15:46:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c3748f7ff9e164de94652f991719917\"},\"description\":\"This guide covers the basics of learning cryptography. Master the art of creating ciphers with a list of cryptography course suggestions, book recommendations, and online resources.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/#primaryimage\",\"url\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/internet-3563638_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/internet-3563638_1280.jpg\",\"width\":1020,\"height\":529,\"caption\":\"Close-up of a person\u2019s hands operating a tablet, the right hand holding it steady and the left hand moving to touch the screen, with a digital image of a cyber network hovering above the device.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/cryptography\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Degrees\",\"item\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/degrees\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Learn Cryptography and Discover the Key to Secure Communication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/\",\"name\":\"Career Karma\",\"description\":\"Latest Coding Bootcamp News &amp; Career Hacks from Industry Insiders\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c3748f7ff9e164de94652f991719917\",\"name\":\"Marc Juberg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Marc-Headshot.jpg\",\"url\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Marc-Headshot.jpg\",\"contentUrl\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Marc-Headshot.jpg\",\"caption\":\"Marc Juberg\"},\"description\":\"Marc is an expert on the American higher education system, having navigated it for 12 years as a student and four years as a college writing instructor. He has earned three degrees: a Bachelor of Arts in English Literature from the University of California, Berkeley and a Master of Arts in English and a PhD in English from the University of Minnesota. As a currently debt-free former recipient of several federal grants and loans, and the winner of numerous institutional scholarships and fellowships, he is also an expert on financing options for both undergraduate and graduate degree programs. Since joining Career Karma in 2020, Marc has contributed his expertise to the writing and editing of hundreds of articles on an array of topics related to postsecondary educational opportunities. His love of language and his passion for teaching bleeds into his work for Career Karma\u2019s blog, where he has helped to train dozens of young writers and editors. When he is not working, he can be found running, hiking, or reciting Shakespeare to his daughter.\",\"url\":\"https:\\\/\\\/careerkarma.com\\\/blog\\\/author\\\/marc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Learn Cryptography: Best Online Courses and Resources","description":"This guide covers the basics of learning cryptography. Master the art of creating ciphers with a list of cryptography course suggestions, book recommendations, and online resources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/careerkarma.com\/blog\/cryptography\/","og_locale":"en_US","og_type":"article","og_title":"How to Learn Cryptography and Discover the Key to Secure Communication","og_description":"This guide covers the basics of learning cryptography. Master the art of creating ciphers with a list of cryptography course suggestions, book recommendations, and online resources.","og_url":"https:\/\/careerkarma.com\/blog\/cryptography\/","og_site_name":"Career Karma","article_publisher":"http:\/\/facebook.com\/careerkarmaapp","article_published_time":"2020-12-19T03:37:27+00:00","article_modified_time":"2021-01-11T15:46:47+00:00","og_image":[{"width":1020,"height":529,"url":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/internet-3563638_1280.jpg","type":"image\/jpeg"}],"author":"Marc Juberg","twitter_card":"summary_large_image","twitter_creator":"@career_karma","twitter_site":"@career_karma","twitter_misc":{"Written by":"Marc Juberg","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/careerkarma.com\/blog\/cryptography\/#article","isPartOf":{"@id":"https:\/\/careerkarma.com\/blog\/cryptography\/"},"author":{"name":"Marc Juberg","@id":"https:\/\/careerkarma.com\/blog\/#\/schema\/person\/7c3748f7ff9e164de94652f991719917"},"headline":"How to Learn Cryptography and Discover the Key to Secure Communication","datePublished":"2020-12-19T03:37:27+00:00","dateModified":"2021-01-11T15:46:47+00:00","mainEntityOfPage":{"@id":"https:\/\/careerkarma.com\/blog\/cryptography\/"},"wordCount":3353,"commentCount":0,"image":{"@id":"https:\/\/careerkarma.com\/blog\/cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/internet-3563638_1280.jpg","articleSection":["Tech Guides"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/careerkarma.com\/blog\/cryptography\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/careerkarma.com\/blog\/cryptography\/","url":"https:\/\/careerkarma.com\/blog\/cryptography\/","name":"Learn Cryptography: Best Online Courses and Resources","isPartOf":{"@id":"https:\/\/careerkarma.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/careerkarma.com\/blog\/cryptography\/#primaryimage"},"image":{"@id":"https:\/\/careerkarma.com\/blog\/cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/internet-3563638_1280.jpg","datePublished":"2020-12-19T03:37:27+00:00","dateModified":"2021-01-11T15:46:47+00:00","author":{"@id":"https:\/\/careerkarma.com\/blog\/#\/schema\/person\/7c3748f7ff9e164de94652f991719917"},"description":"This guide covers the basics of learning cryptography. Master the art of creating ciphers with a list of cryptography course suggestions, book recommendations, and online resources.","breadcrumb":{"@id":"https:\/\/careerkarma.com\/blog\/cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/careerkarma.com\/blog\/cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/careerkarma.com\/blog\/cryptography\/#primaryimage","url":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/internet-3563638_1280.jpg","contentUrl":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2020\/12\/internet-3563638_1280.jpg","width":1020,"height":529,"caption":"Close-up of a person\u2019s hands operating a tablet, the right hand holding it steady and the left hand moving to touch the screen, with a digital image of a cyber network hovering above the device."},{"@type":"BreadcrumbList","@id":"https:\/\/careerkarma.com\/blog\/cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/careerkarma.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Degrees","item":"https:\/\/careerkarma.com\/blog\/degrees\/"},{"@type":"ListItem","position":3,"name":"How to Learn Cryptography and Discover the Key to Secure Communication"}]},{"@type":"WebSite","@id":"https:\/\/careerkarma.com\/blog\/#website","url":"https:\/\/careerkarma.com\/blog\/","name":"Career Karma","description":"Latest Coding Bootcamp News &amp; Career Hacks from Industry Insiders","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/careerkarma.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/careerkarma.com\/blog\/#\/schema\/person\/7c3748f7ff9e164de94652f991719917","name":"Marc Juberg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/02\/Marc-Headshot.jpg","url":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/02\/Marc-Headshot.jpg","contentUrl":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/02\/Marc-Headshot.jpg","caption":"Marc Juberg"},"description":"Marc is an expert on the American higher education system, having navigated it for 12 years as a student and four years as a college writing instructor. He has earned three degrees: a Bachelor of Arts in English Literature from the University of California, Berkeley and a Master of Arts in English and a PhD in English from the University of Minnesota. As a currently debt-free former recipient of several federal grants and loans, and the winner of numerous institutional scholarships and fellowships, he is also an expert on financing options for both undergraduate and graduate degree programs. Since joining Career Karma in 2020, Marc has contributed his expertise to the writing and editing of hundreds of articles on an array of topics related to postsecondary educational opportunities. His love of language and his passion for teaching bleeds into his work for Career Karma\u2019s blog, where he has helped to train dozens of young writers and editors. When he is not working, he can be found running, hiking, or reciting Shakespeare to his daughter.","url":"https:\/\/careerkarma.com\/blog\/author\/marc\/"}]}},"_links":{"self":[{"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/posts\/27223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/comments?post=27223"}],"version-history":[{"count":0,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/posts\/27223\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/media\/27224"}],"wp:attachment":[{"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/media?parent=27223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/categories?post=27223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/tags?post=27223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}