Learning Cryptography and Network Security

Learning Cryptography and Network Security

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 2h 03m | 297 MB

Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and discusses practical ways to apply cryptography to ensure data security and integrity. By the end of this course, you’ll have a solid understanding of what it takes to move and store data securely.

Table of Contents

1 Keeping information safe
2 What you need to know
3 Providing security services
4 Compare network attacks
5 Introduce cryptographic terminology
6 Review the history of cryptography
7 Challenge Coding with the Enigma
8 Solution Coding with the Enigma
9 Introducing symmetric encryption
10 Developing DES
11 Work with AES
12 Compare block and stream ciphers
13 Understand modes of operation
14 Secure wireless communication
15 Challenge Encrypt data with AES
16 Solution Encrypt data with AES
17 Grasping public key cryptography
18 Exchanging keys using asymmetric encryption
19 Using digital signatures
20 Managing keys using PKI
21 Navigating certificates
22 Diving into hash algorithms
23 Looking deeper into message digests
24 Understanding passwords
25 Challenge Password strength tests
26 Solution Password strength tests
27 Introducing Transport Layer Security
28 Providing email privacy
29 Implementing email security with GPG
30 Examining blockchain technology
31 Safeguarding cryptography
32 Exploring Internet Protocol Security
33 Dissecting the Authentication Header
34 Encapsulating Security Payload
35 Comparing IPsec operating modes
36 Next steps