Introduction to Cryptography Course

2 hours, 11 minutes

Syllabus

Cryptography, hashing and salting

Video - 00:34:00

Cryptography secures information, hashing verifies data integrity, and salting protects hashed data by adding random inputs.
Encryption

Video - 00:21:00

Cryptography and encryption involve techniques to secure data by converting it into an unreadable format. Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a pair of keys. Block ciphers encrypt data in fixed-size blocks, whereas stream ciphers encrypt data one bit or byte at a time.
Certificates and PKI

Video - 00:26:00

Certificates and Public Key Infrastructure (PKI) are crucial for managing digital identities and ensuring secure communications. Certificates are used to verify identities, PKI manages the creation, distribution, and revocation of certificates, digital signatures provide non-repudiation, and certificate authorities (CAs) issue and manage certificates.
Cryptography Tools

Video - 00:08:00

Explore hardware-based encryption solutions like TPM, HSM, and secure enclaves, along with key management best practices, to fortify cybersecurity defenses.
Cryptography use cases

Video - 00:19:00

Discussing practical applications of cryptography such as securing communications and ensuring data integrity.
Wireless Security

Video - 00:23:00

Strategies to protect wireless networks, including the use of secure protocols and avoiding deprecated technologies.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust