Encryption Algorithms
Welcome to the "Encryption Algorithms Practice Lab". In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Already have an account? Sign In »

Introduction
Welcome to the Encryption Algorithms Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercise:
- Exercise 1 - Install Cryptodemo
After completing this lab, you will be able to:
- Understand the different types of encryption algorithms
Exam Objectives
The following exam objectives are covered in this lab:
- Understand encryption - encryption algorithms
Lab Duration
It will take approximately 30 minutes to complete this lab.
Exercise 1 - Learn Encryption Algorithms with CryptoDemo
Communication over the Internet is susceptible to being read or modified by unauthorized parties using an array of hacking tools available online. Cryptography provides security and protection for data from being read, and it includes features that detect whether data has been altered while it is being transmitted over non-secure networks.
One of the technologies included in cryptography is encryption. Encryption uses keys like digital certificates (called certificates or digital IDs) or passwords to protect data by scrambling it, therefore making it unreadable to unintended parties. The keys can be self-issued or issued by a service called a Certification Authority.
With the keys now available, a user can restrict access to his personal data by applying encryption. Encryption is the process of converting plain text data into cipher text or encrypted form to protect information from being read by unintended personnel. Only authorized persons with the right encryption key like a password or certificate can decrypt it.
In this exercise, you will download and install a program for that illustrates the common encryption algorithms being used today by software vendors.
Learning Outcomes
After completing this exercise, you will be able to:
- Understand the different types of encryption algorithms
See the full benefits of our immersive learning experience with interactive courses and guided career paths.