Introduction to Cryptography Course
2 hours, 11 minutes
Syllabus
Cryptography, hashing and salting
Video - 00:34:00
Cryptography secures information, hashing verifies data integrity, and salting protects hashed data by adding random inputs.
Encryption
Video - 00:21:00
Cryptography and encryption involve techniques to secure data by converting it into an unreadable format. Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a pair of keys. Block ciphers encrypt data in fixed-size blocks, whereas stream ciphers encrypt data one bit or byte at a time.
Certificates and PKI
Video - 00:26:00
Certificates and Public Key Infrastructure (PKI) are crucial for managing digital identities and ensuring secure communications. Certificates are used to verify identities, PKI manages the creation, distribution, and revocation of certificates, digital signatures provide non-repudiation, and certificate authorities (CAs) issue and manage certificates.
Cryptography Tools
Video - 00:08:00
Explore hardware-based encryption solutions like TPM, HSM, and secure enclaves, along with key management best practices, to fortify cybersecurity defenses.
Cryptography use cases
Video - 00:19:00
Discussing practical applications of cryptography such as securing communications and ensuring data integrity.
Wireless Security
Video - 00:23:00
Strategies to protect wireless networks, including the use of secure protocols and avoiding deprecated technologies.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps