Your experience on this site will be improved by allowing cookies
Basic Concepts of Cryptography
Public-key Cryptography
Cryptographic Hash Functions
Digital Signature and Certificate
Transport Layer Security and IPSec
Biometrics
Private-key Cryptography
Diffie-Hellman Key Exchange and Authentication
One-Way Hash Functions
Secure Socket Layer (SSL) and How it Works
Steganography
This course will begin by introducing you to the concept of Cryptography. You will learn about private-key cryptography, public-key cryptography and the principles behind how they work. You will learn about generic security attacks, security services and cryptographic primitives which are used for the provision of such security services. You will also learn about private key cryptography techniques and be introduced to some cryptography algorithms and classical encryption techniques broadly categorized into substitution and transposition ciphers. You will then get to learn about Diffie-Hellman key exchange and message authentication as it relates to cryptography.
The course then explains cryptographic hash functions. You will learn about the basic properties of hash functions, requirements of hash functions and popular hash functions. Furthermore, you will learn the importance of digital signatures, digital certificates, secure socket layer and some common security protocols. You will learn about the types of one-way hash functions and understand the several ways one-way hash functions can be used before you move on to learn specifically about two different hash functions; the SHA-512 and HMAC. You will also learn about the Transport Layer Security(TLS), IP security(IPsec) and Secure HTTP(S-HTTP).
Finally, you will learn the importance of information security, including email security and DNS. You will learn about biometrics and steganography. You will learn about the history of steganography, steganography in image files, methods of steganography, and examples of steganographic images. As for biometrics, you will get educated on the various biometric traits used in practice like fingerprints, iris scan, hand geometry and major applications of biometrics for authentication. Start this free course today and build your knowledge base.
Cryptographic Primitives
Private-Key Cryptography (Part I)
Private-Key Cryptography (Part II)
Public-Key Cryptography
Encryption and Authentication
Encryption and Authentication
RSA Algorithm
Diffie Hellman Key Exchange
Message Authentication
Lesson Summary
Types of One Way Hash Functions
A Case Study: The SHA-512 Algorithm
A Case Study: HMAC
Digital Signature
Digital Certificate
Secure Socket Layer (SSL) & How it Works
Transport Layer Security
IPSec
Secure HTTP (S-HTTP)
Lesson Summary
0 Reviews
Teach Academy eLearning provides corporate, government and education sectors with proven on-demand training for employees. The company was founded in 2015 and has had more than 1.3 million students taking their courses. Teach Academy eLearning is a name you can trust for workforce training. The company specialises in video-based technology training content. The goal has always been to engage learners through an immersive, hands-on learning approach. Teach Academy prides itself on releasing titles on the cutting edge of technology. The subject matter experts are deeply involved in the subjects they teach, so the courses go into great depth and provide learners with the skills they need to implement real-world solutions with a given technology. The courses offered by Teach Academy vary from data analytics, software development and marketing to productivity in meetings and data visualisation.
Send this course as a gift to your friends