0% found this document useful (0 votes)
42 views

03 Cryptography

Cryptography is a course that covers key topics like encryption types, how encryption works, and securing data through hashing. [It presents topics across three sections, including encryption concepts and tools, symmetric and asymmetric encryption, and advanced techniques like hashing and digital signatures.] The course contains many videos that demonstrate cryptography principles like encryption, public key exchanges, and analyzing encrypted data through tools like CryptTool and hash calculators.

Uploaded by

etet
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

03 Cryptography

Cryptography is a course that covers key topics like encryption types, how encryption works, and securing data through hashing. [It presents topics across three sections, including encryption concepts and tools, symmetric and asymmetric encryption, and advanced techniques like hashing and digital signatures.] The course contains many videos that demonstrate cryptography principles like encryption, public key exchanges, and analyzing encrypted data through tools like CryptTool and hash calculators.

Uploaded by

etet
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cryptography

December 29, 2015

1 Introduction
Get started with Cryptography by viewing our course videos below. If you are
looking to know the difference between clear text and cypher text, compare
different encryption types, learn how encryption works, and how to secure and
compare data through the use of hashing, this course is for you.

2 Section 1

Topic title Topic description


This introduction video provides an outline of the curricu-
1. Introduction to Cryptography
lum covered in Cybrary’s in-depth Cryptography course.
This Cryptography presentation discusses and demon-
2. Key Concepts of Cryptogra-
strates the key concepts of Cryptography from attacks,
phy: PKIs and Encryption
PKIs and Encryption in detail.
3. Introduction to Crypto- This intro video outlines the essential cryptographic tools
graphic Tools necessary to perform Cryptography.
This Cryptography lecture series covers about the services
4. Services and Threats of Cryp-
Cryptography provides, as well as the three main threats
tography
to privacy and confidentiality.

3 Section 2

Topic title Topic description


Learn about the concept of integrity checking and how to
1. Integrity Checking: Modifica-
test for modifications in this lecture series about Crypto-
tions
graphic tools.
Learn how to properly create CipherText and the processes
2. CipherText
behind it in this lecture series on Cryptography.

1
Topic title Topic description
3. Master Pattern Analysis with Learn how to perform pattern analysis with CryptTool to
CrypTool identify trends during the encryption process.
section 2 continues its focus on Cryptographic tools with
4. Symmetric Encryption an in-depth introduction and analysis of Symmetric En-
cryption.
5. Stream Ciphers, XOR and This lecture video series explores steam ciphers, XOR and
RC4 RC4 as it relates to Symmetric Encryption.
We discuss the pros and cons of Symmetric Cryptography
6. Pros and Cons of Symmetric
and how its strengths and limitations affect its use in en-
Cryptography
cryption methods.
This lesson discusses how the public and private key ex-
7. Public Key Cryptography change happens, how Asymmetric Cryptography works and
how to employ it.

4 Section 3

Topic title Topic description


In this session, we learn how Asymmetric Cryptography
1. Asymmetric Cryptography
delivers all four encryption services: privacy, authenticity,
Functions
integrity and non-repudiation.
We continue our focus on Asymmetric Cryptography with
2. Public Key Exchange a detailed diagram and discussion on secure public key ex-
change and how it works.
The Advanced Encryption Package lab demonstrates use
3. Advanced Encryption Pack- of an advanced encryption analysis components and how
age to use them to dig deeper in your file, password and data
analysis.
This lecture video provides an extensive overview of Hash-
4. Hashing and Hash Collisions
ing and Hash Collisions.
The Hash Calc lab teaches you what information is gained
5. Hash Calc from using Hash Calculators to analyze files within a direc-
tory, or specifically targeted files.
In this sub-part of our previous Hash lesson, we take a
6. Digital Signatures,
closer, more intimate look at digital signatures, SHA2(256)
SHA2(256) and RSA
and RSA.
This lab demonstrates the Hash My Files tool which ana-
7. Hash my Files lyzes files by specific file or by directory and validates their
integrity

You might also like