Cryptography Application
Offered By: Pluralsight
Course Description
Overview
Cryptography is an exciting and interesting field, but many people are apprehensive - don't be! This course will explain cryptography in a useful and interesting manner! You'll be comfortable with crypto and how to use it in no time!
Cryptography is all about logic and process - understanding the terminology, the process flow, and the strengths and weaknesses of the various cryptographic algorithms. Through this course, Cryptography Application, you will learn how cryptography works, how to attack it and how it is used in everyday life. First, you will explore the fascinating world of cryptography and become familiar with each type of algorithm. Next, you will learn how cryptography works in many of the tools we use today. Finally, you will learn how to attack and compromise a crypto system. When you're finished with this course, you will have a comfortable understanding of cryptography and its application.
Topics:
Cryptography is all about logic and process - understanding the terminology, the process flow, and the strengths and weaknesses of the various cryptographic algorithms. Through this course, Cryptography Application, you will learn how cryptography works, how to attack it and how it is used in everyday life. First, you will explore the fascinating world of cryptography and become familiar with each type of algorithm. Next, you will learn how cryptography works in many of the tools we use today. Finally, you will learn how to attack and compromise a crypto system. When you're finished with this course, you will have a comfortable understanding of cryptography and its application.
Topics:
- Course Overview
- Introduction to Cryptography
- Cryptography Operations and Uses
- Cryptanalysis and Attacks
Taught by
Kevin Henry
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera