- Why Cryptography?
- Caesar Cipher
- Vigenere Cipher
- Moving to Binary
- Hashing
- Asymmetric Cryptography
- Asymmetric Methods
- Certificates
- Public Key Infrastructure (PKI)
- Living with Certificates
What you'll learn
- Define cryptography and the key role it plays in protecting our digital data.
- Learn how hashing helps us to be certain the data we receive or download is legitimate.
- Find out how Web sites use certificates to make sure our usernames, passwords, credit card numbers, and other personal data stay secure.
- Prepare for the CompTIA Security+ exam by better understanding cryptography and PKI, one of the six exam domains.
- Understand ciphers, binary, hashing, symmetric and asymmetric cryptosystems, digital signatures and certificates, and public key infrastructure.
Description
Hey there! Mike Meyers, your favorite nerd, here to present a fun, casual, and informative conversation on cryptography. I partnered with my good friend, Bill Saichek, to talk about one of my very favorite topics: cryptography. I've loved the idea of cryptic codes, secret agents, and deciphering hidden text since I was a kid. And because I've had so many questions on this topic, I decided to try a different kind of course to help my students understand the more complex concepts in cryptography.
This Conversation on Cryptography course was designed with YOU in mind, whether you're just curious about cryptography (like me), or you took my CompTIA Security+ (SY0-501): The Total Course (or any other cyber security course) and would like a better understanding of this intriguing subject. Here's a rundown of what Bill and I talk about:
Caesar and Vigenere ciphers - These fascinating ciphers form part of the basic foundation of cryptography, back before the digital age when militaries, powerful leaders, and spies had to pass messages that couldn't be deciphered if they fell into enemy hands.
Binary - In order for ciphers to be useful today, cryptographers had to figure out how to translate them into the language of computers (1s and 0s).
Hashing - If all our digital data are just strings of 1s and 0s, how can we make sure we have the real deal? Learn about authentication in this episode.
Asymmetric cryptography - We discuss how generating a key pair offers more security, though at the price of taking more time.
Symmetric cryptography - This quick and dirty cryptosystem uses a single key to both encrypt and decrypt.
Asymmetric methods - Dig into how these methods actually work, and how prime numbers are keeping your data safe. Did we
mention we play with paint in this episode?
Certificates - The Web is full of hackers who want to take advantage of your personal and private information. So, who do we trust? That's where certificates come in.
Public key infrastructure - How do we pass out those certificates? And assure the authenticity of them? PKI to the rescue!
Living with certificates - We get our hands on some of those certificates and teach you how to troubleshoot them when something goes wrong.
So sit down, grab a cup of coffee, and join Bill & I for a conversation on cryptography.
Other Courses
The Essentials of Growth Marketing
Use the foundations of Growth Marketing to grow your business, using tried and tested processes, easy-to-follow course!
Cybersecurity Fundamentals - Part 1 - Information Security
For jobseekers and career change aspirants - Learn from Industry Leaders
Write, Publish, Market , and Make MONEY with Your Own Book
Discover The Tried-And-True Strategy Top Coaches Use To Attract, Grow And Build Their Audience and Client List
Try AngularJS: Beginner's Guide to Front End Web Development
Built and managed by Google, AngularJS is one of the most powerful front-end frameworks in the world.
Introduction to the SAP Activate Methodology
Learn from top SAP experts how to make your SAP project successful with the NEW SAP Activate methodology
Local Area Networks for Absolute Beginners - Solved Problems
Practical Solutions for Local Area Network Challenges
About the instructors
- 4.66 Calificación
- 660136 Estudiantes
- 45 Cursos
Total Seminars • Over 1 Million Enrollments
Home of Mike Meyers and his Team of IT Certification Pros
Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.
Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.
Student feedback
Course Rating
Reviews
This course really broke down some of the topics I had an issue understanding. Great work as usual!
I enjoy this course
when mentioning VPN, would be a good idea to define for folks that do not know what it is...
Both the participants in this training are amazingly talented as they were able to create the interest in the topic exceedingly well.