By the time you finish this course, you should understand the most important cryptographic tools and be able to use them.
We will cover basic proof techniques, zero knowledge, multiparty computation, elliptic-curve cryptography, cryptanalysis, privacy, and post-quantum cryptography.
If cryptography course covers how to design an cipher and applied cryptography teaches you how to use pre-existing ciphers in protocols then do the applied course.
Nobody needs to design a cipher - that can be left to the handful of people who know what they are doing.
Cryptography uses mathematical functions to transform data and prevent it from being read or tampered with by unauthorized parties.
Nearly every computing and communications device uses cryptographic technologies to protect the confidentiality and integrity of information that is communicated and/or stored.