Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and provides a demonstration of a typical SSL transaction. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely.
Topics include:
Understanding why encryption is necessary
Comparing passive and active network attacks
Reviewing the terminology and history of cryptography
Using symmetric encryption
Dissecting block and stream ciphers
Dissecting the public-key algorithms
Creating key pairs
Understanding passwords, hash, salt, and rainbow tables
Exploring Secure Sockets Layer
Investigating email and IP security
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
00. Introduction/00_01 - Welcome.mp4
24.3 MB
00. Introduction/00_02 - What you should know before watching this course.mp4
1.7 MB
00. Introduction/00_03 - Using the exercise files.mp4
473.7 KB
00. Introduction/00_04 - Challenges explained.mp4
3.2 MB
01. Network Security/01_01 - Understanding why encryption is necessary.mp4
8 MB
01. Network Security/01_02 - Providing confidentiality, integrity authentication, and non-repudiation.mp4
8.3 MB
01. Network Security/01_03 - Comparing passive and active network attacks.mp4
18.3 MB
01. Network Security/01_04 - Introducing common cryptographic concepts and terminology.mp4
11.6 MB
01. Network Security/01_05 - Reviewing the history of cryptography.mp4
12.9 MB
01. Network Security/01_06 - Challenge Coding with the Enigma machine.mp4
3.8 MB
01. Network Security/01_07 - Solution Coding with the Enigma machine.mp4