Gain a basic understanding of Fundamentals of Cryptography & Encryption
- Free tutorial
- Rating: 4.1 out of 54.1 (25 ratings)
- 1,820 students
- 56min of on-demand video
- Created by Revanth Vemireddy
- English
What you’ll learn
- Understand what Encryption is and it’s importance
- Understand what Cryptography is, it’s importance and the types of Cryptographic Algorithms
- Learn about Digital Signatures, Digital Certificates & Certifying Authorities
- Applications of Cryptography and Encryption
- Public Key Infrastructure & it’s role in Information Security
Requirements
- No prior knowledge required, however knowing the fundamentals of Cybersecurity will be useful.
Description
Hi, this course serves as an overview for Encryption & Cryptography Concepts, The following serves as course description, discussing what each section comprises of.
In Section One: We will start with learning about the Encryption & Cryptography. We’ll learn what they are, how they are similar and different from each other & their applications
In Section Two: We will learn how to use Encryption tools such as VeraCrypt & Cryptomator
In Section Three: We will learn what Digital Signatures, Digital Certificates & Certifying Authorities are and their roles.
In Section Four : We will learn about Public Key Infrastructure & how it is managed.
Following are the learning Objectives for this course:
* Understand what Encryption is and it’s importance
* Learn how to Encrypt folders & external drives
* Understand what Cryptography is, it’s importance and the types of Cryptographic Algorithms
* Learn about Digital Signatures, Digital Certificates & Certifying Authorities
* Applications of Cryptography and Encryption
* Public Key Infrastructure & it’s role in Information Security
I hope you find this course useful, Please feel free to write a review and I will do my best to constantly improve the content quality. I thank you for your co-operation & patience. I sincerely hope that you’ll find this course useful. Happy learning.
Disclaimer: This is not an official course, I am not a certified instructor. I am a merely a student explaining what I’ve learned in order to make the learning process simpler and easier to comprehend. I studied from multiple sources and I hand picked the simplest explanations & made my own examples to simplify hard to understand topics, to make your learning process relatively easier.
This course is only intended to document my learning process and I hope that by sharing my learning experience, the sources/material i studied from & explanations, it will help fellow students better understand the topics. I hope you find this course insightful.
I mentioned the sources to the best of my ability & i thank them for sharing their knowledge, however in case of any copyright issues or content removal, kindly contact me on my social media accounts.
Who this course is for:
- This course is for individuals who want to learn more about ways to protect Information/Data
Show less
Course content
4 sections • 24 lectures • 55m total lengthCollapse all sections
Cryptography & Encryption Algorithms16 lectures • 21min
- What is Encryption ?00:50
- Types of Encryption00:53
- Factors influencing effective Encryption00:46
- What is Cryptography ?00:57
- What is Cryptanalysis01:27
- Cryptographic Algorithms00:21
- Symmetric Key01:23
- Asymmetric Key00:34
- Cryptographic Hash Function00:21
- What is Hashing ?01:34
- Hashing vs Encryption00:59
- Characteristics of Hash Function01:36
- How does Hashing work02:04
- 14. Types of Hashing Algorithms02:39
- Cryptography – Benefits & Drawbacks03:08
- Future of Cryptography01:36
Encryption Tools2 lectures • 4min
- Creating Encrypted Backups using 7zip01:51
- VeraCrypt – Installation Windows 1001:52
Digital Certificates & Signatures4 lectures • 14min
- Digital Signatures04:18
- Digital Certificates03:50
- Differences b/w Digital Signatures & Digital Certificates, PFS & Cipher Suite02:20
- Digital Certificate Authorities03:52
Public Key Infastructure2 lectures • 17min
- PKI Infrastructure05:36
- PKI Management10:56