Introduction to Cryptography

Invite Friends
Facebook Twitter Google+ LinkedIn Email
Description
Virtual Practice Lab
Practice Test
Resources
Introduction to Cryptography

Welcome to the free Cybrary online course Cryptography. To help you fully understand and grasp the concepts of Cryptography, the Cybrary Cryptography module is divided into three sections, each taking a detailed, intimate focus on the concepts, tools and techniques that are absolutely essential for penetration testers and ethical hackers to master.

In this series on Cryptography, we look at confidentiality, integrity and authentication. We’ll look at how companies use secrecy to their advantage and explore how penetration testers and ethical hackers can secrecy to their advantage as well.

We’re now in Section 1 of the Cybrary Cryptography module. In this Section, we’ll introduce and explain the basic principles behind the science and practice of Cryptography both from an academic perspective as well as the practitioners’ perspective from the field.

The topics covered in Section 1 of the Cryptography module are as follows:

  • Whiteboard, which outlines the interrelationship of all the basic principles and components of Cryptography you’ll need to understand
  • And the following subsections introducing Cryptographic Tools and how to use them:
    • Cryptography Part 3.1
    • Cryptography Part 3.2

Section 2 of the Cryptography module is quite extensive and very hands-on. Parts 3-7 breaks down even further Cryptographic Tools introducing more techniques, a lab and an advanced discussion on encryption.

Follow along with the following subsections:

  • Cryptography Part 3.3 – Cryptographic Tools
  • Cryptography Part 3.4 – Confidentiality
  • Cryptography – CryptTool Lab
  • Cryptography Part 4 – Symmetric Encryption
  • Cryptography Part 5 – Symmetric Encryption Extended
  • Cryptography Part 6 – Pros and Cons of Symmetric Cryptography
  • Cryptography Part 7 – Public Key Cryptography

And finally, Section 3 of the Cryptography module continues exploring Cryptographic Tools with discussion and demonstration of Asymmetric Cryptography. View our labs and in-depth discussion in the following subsections:

  • Cryptography Part 8 – Asymmetric Cryptographic
  • Cryptography Part 9 – Cryptography
  • Cryptography – Advanced Encryption Package Lab
  • Cryptography – Part 10.1
  • Cryptography – Hash Calc Lab
  • Cryptography – Part 10.2
  • Cryptography – Hash My Files Lab

Upon completion of this Cybrary Cryptography module, you’ll understand how Cryptography works, what principles are in play, and what tools you’ll need to master to become the go-to pentester going forward.

Please note that Cryptography is a complex topic. We explore Cryptography in great detail in the Cryptography Module #19 of our Penetration Testing and Ethical Hacking course, as well as in our CompTIA CASP courses.

Watch the Course Intro Video
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google PlayGet it on the App Store
Practice Labs and Exam Vouchers

Congratulations! You're taking the first step to getting certified. Get some hands on experience with available practice labs OR save some money, support Cybrary, and purchase discounted exam vouchers. Ready to earn your next industry certification? Join cyber security's largest community and start learning today.

JOIN CYBRARY

Upcoming Industry Events

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel