Introduction to Cryptography

Welcome to the free Cybrary online course Cryptography. To help you fully understand and grasp the concepts of Cryptography, the Cybrary Cryptography module is divided into three sections, each taking a detailed, intimate focus on the concepts, tools and techniques that are absolutely essential for penetration testers and ethical hackers to master. In this series on Cryptography, we look at confidentiality, integrity and authentication. We'll look at how companies use secrecy to their advantage and explore how penetration testers and ethical hackers can secrecy to their advantage as well. We’re now in Section 1 of the Cybrary Cryptography module. In this Section, we'll introduce and explain the basic principles behind the science and practice of Cryptography both from an academic perspective as well as the practitioners' perspective from the field. The topics covered in Section 1 of the Cryptography module are as follows:
  • Whiteboard, which outlines the interrelationship of all the basic principles and components of Cryptography you’ll need to understand
  • And the following subsections introducing Cryptographic Tools and how to use them:
    • Cryptography Part 3.1
    • Cryptography Part 3.2
Section 2 of the Cryptography module is quite extensive and very hands-on. Parts 3-7 breaks down even further Cryptographic Tools introducing more techniques, a lab and an advanced discussion on encryption. Follow along with the following subsections:
  • Cryptography Part 3.3 – Cryptographic Tools
  • Cryptography Part 3.4 - Confidentiality
  • Cryptography – CryptTool Lab
  • Cryptography Part 4 – Symmetric Encryption
  • Cryptography Part 5 - Symmetric Encryption Extended
  • Cryptography Part 6 – Pros and Cons of Symmetric Cryptography
  • Cryptography Part 7 – Public Key Cryptography
And finally, Section 3 of the Cryptography module continues exploring Cryptographic Tools with discussion and demonstration of Asymmetric Cryptography. View our labs and in-depth discussion in the following subsections:
  • Cryptography Part 8 – Asymmetric Cryptographic
  • Cryptography Part 9 - Cryptography
  • Cryptography – Advanced Encryption Package Lab
  • Cryptography – Part 10.1
  • Cryptography – Hash Calc Lab
  • Cryptography – Part 10.2
  • Cryptography – Hash My Files Lab
Upon completion of this Cybrary Cryptography module, you’ll understand how Cryptography works, what principles are in play, and what tools you'll need to master to become the go-to pentester going forward. Please note that Cryptography is a complex topic. We explore Cryptography in great detail in the Cryptography Module #19 of our Penetration Testing and Ethical Hacking course, as well as in our CompTIA CASP courses.
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?