Take this
course

Software Development / Security & Encryption

Cryptography Weaknesses

We will discuss weaknesses in cryptography, the use of symmetric, hybrid, asymmetric keys, and hashing algorithms, digital signatures and ways to improve your security.

Description

Cryptography is the science of writing in secret code and is considered an ancient art. The first documented use of cryptography dates back to circa 1900 B.C. 


In this Cryptography Weaknesses course we discuss weaknesses in cryptography and ways to improve your security. We also cover the use of symmetric and asymmetric keys and the use of hybrid keys, as well as the use of hashing algorithms and digital signatures. We pair this with several demos to show you how each of these works in practical situations. 


Topics Covered Include:

  • Encryption
  • Symmetric Encryption
  • Hashing Algorithms
  • Digital Signatures 

Take Advantage of our extra downloadable supplemental materials. 

**This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Cryptography Weaknesses.

Full details

Curriculum

  • Encryption
    Introduction
    2:31
    DEMO: BitLocker
    4:17
    Cryptographic Schemes
    0:48
  • Symmetric Encryption
    Introduction
    1:02
    DEMO: Symmetric
    2:43
    Stream and Block Ciphers
    3:43
    AES
    9:40
  • Asymmetric Encryption
    Introduction
    1:58
    DEMO: Asymmetric
    3:14
    Key Exchange Methods
    3:40
  • Hashing Algorithms
    Hashing
    1:01
    DEMO: Hashcalc
    1:38
    Hash Algorithms
    3:52
  • Digital Signatures
    Encryption Usage Examples
    1:28
    DEMO: Signature
    4:10
    Internet Security
    2:53
  • Conclusion
    Conclusion
    0:39
    Cryptography Weaknesses: Supplemental Materials
    Take advantage of all our extra downloadable supplemental materials. This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Cryptography Weaknesses Chapters 1 - 5.

Skills

  • Certified Ethical Hacker (CEH)
  • CompTIA Security+
  • IT Certification
  • IT Security
  • IT Security Certification
  • Information Security
  • Information Systems Security

Similar Courses

More Courses by this Instructor