Course Content Introduction to Cryptography Basic Terminology Used in Cryptography Discrete Math for Cryptography Extended Euclidean Algorithm with Example Additive Shift Ceaser Cipher Technique Cryptanalysis Attacks Cryptanalysis for Additive Cipher Symmetric Asymmetric Substitution Transposition in Cryptography Multiplicative Inverse for Cryptography