Please accept cookies to help us improve this website Is this OK? Yes No More on cookies »
Item number: 110041585

Cryptography Fundamentals Training

Item number: 110041585

Cryptography Fundamentals Training

149,00 180,29 Incl. tax

Cryptography Fundamentals Training Award-winning E-Learning course Extensive interactive videos with spoken text Certified teachers Practical exercises Certificate.

Read more
Discounts:
  • Buy 2 for €146,02 each and save 2%
  • Buy 3 for €144,53 each and save 3%
  • Buy 5 for €138,57 each and save 7%
  • Buy 10 for €134,10 each and save 10%
  • Buy 25 for €126,65 each and save 15%
  • Buy 50 for €116,22 each and save 22%
  • Buy 100 for €104,30 each and save 30%
  • Buy 200 for €74,50 each and save 50%
Availability:
In stock
Delivery time:
Ordered before 5 p.m.! Start today.
  • Award Winning E-learning
  • Lowest price guarantee
  • Personalized service by our expert team
  • Pay safely online or by invoice
  • Order and start within 24 hours

Cryptography Fundamentals E-Learning

Order this amazing, award-winning Cryptography Fundamentals E-Learning Training course online, 1 year 24/7 access to extensive interactive videos, speeches, hands-on tasks and progress monitoring. After the course you will receive a certificate of attendance.

Cryptography, simply defined, is the practice of protecting sensitive data. For businesses, and even individuals, the use of cryptography has become essential for day-to-day operations. Cryptography has become a critical part of IT over the past decade to provide privacy, to secure data at rest, and to secure data in transit. Some of this demand has come from legal and/or regulatory requirements, such as the Payment Card Industry Data Security Standard, or PCI-DSS, and government requirements to protect Personally Identifiable Information, or PII.This path will cover the fundamentals of cryptography and provide you with the knowledge necessary to understand the different types of encryption and when they should be used to protect your data.

Course content

Cryptography Fundamentals: Defining Cryptography

What is Cryptography

Course: 28 Minutes

  • Course Introduction
  • Introducing Cryptography
  • Identifying Historical Use of Cryptography
  • Describing Cryptographic Terminology
  • Defining Why Cryptography is Difficult
  • Identifying the Current State of Cryptography
  • Describing Export Controls and Limits on Cryptography

Purpose of Cryptography

Course: 14 Minutes

  • Describing How Cryptography Provides Confidentiality
  • Recognizing the Need for Data Integrity
  • Defining Cryptography Authentication
  • Applying Non-repudiation to Cryptography

Cryptographic Methods

Course: 27 Minutes

  • Using a One-time Pad
  • Describing Substitution Ciphers
  • Using Symmetric Algorithms
  • Working with Asymmetric Algorithms
  • Hiding Data Using Steganography
  • Using One-way Hashes
  • Describing Digital Signatures

Building Blocks of Cryptography

Course: 21 Minutes

  • Distinguishing between Block and Key Sizes
  • Using Padding
  • Formatting the Output
  • Using Nonces and the Initialization Vector
  • Identifying and Using Entropy
  • Creating or Generating Keys

Practice: Identifying Cryptographic Algorithms

Course: 3 Minutes

  • Exercise: Identify the Cryptographic Algorithm to Use

Modes of Operation

Course: 24 Minutes

  • Course Introduction
  • Describing Electronic Codebook (ECB)
  • Using Cipher Block Chaining (CBC)
  • Using Propagating Cipher Block Chaining (PCBC)
  • Using Cipher Feedback (CFB)
  • Using Output Feedback (OFB)
  • Describing Counter (CTR)

Cryptographic Algorithms

Course: 21 Minutes

  • Using the AES Block Algorithm
  • Applying the DES/3DES Block Algorithm
  • Describing the Blowfish Block Algorithm
  • Describing the RC4 Streaming Algorithm
  • Describing the ElGamal Algorithm
  • Defining the RSA Algorithm

Hash Algorithms

Course: 10 Minutes

  • Describing MD5, SHA1, and SHA
  • Using SHA
  • Describing HMAC

Cryptographic Keys

Course: 14 Minutes

  • Describing Key Management
  • Describing Key Exchange
  • Describing Key Escrow

Everyday Use of Encryption

Course: 21 Minutes

  • Identifying Secure Communications Over HTTPS
  • Working with the Secure Shell (SSH)
  • Using GPG with E-mail
  • Working with Disk Encryption

Analysis

Course: 12 Minutes

  • Identifying Algorithm and Key Strengths
  • Describing Cryptanalysis
  • Describing Side-channel Attacks

Practice: Applying Modes and Key Management

Course: 4 Minutes

  • Exercise: Apply Cryptographic Modes and Algorithms
Language English
Qualifications of the Instructor Certified
Course Format and Length Teaching videos with subtitles, interactive elements and assignments and tests
Lesson duration 3:27 Hours
Progress monitoring Yes
Access to Material 365 days
Technical Requirements Computer or mobile device, Stable internet connections Web browsersuch as Chrome, Firefox, Safari or Edge.
Support or Assistance Helpdesk and online knowledge base 24/7
Certification Certificate of participation in PDF format
Price and costs Course price at no extra cost
Cancellation policy and money-back guarantee We assess this on a case-by-case basis
Award Winning E-learning Yes
Tip! Provide a quiet learning environment, time and motivation, audio equipment such as headphones or speakers for audio, account information such as login details to access the e-learning platform.

There are no reviews written yet about this product.

Loading...

OEM Office Elearning Menu Genomineerd voor 'Beste Opleider van Nederland'

OEM Office Elearning Menu is trots genomineerd te zijn voor de titel 'Beste Opleider van Nederland' door Springest, een onderdeel van Archipel. Deze erkenning bevestigt onze kwaliteit en toewijding. Hartelijk dank aan al onze cursisten.

Reviews

There are no reviews written yet about this product.

25.000+

Deelnemers getrained

Springest: 9.1 - Edubookers 8.9

Gemiddeld cijfer

3500+

Aantal getrainde bedrijven

20+

Jaren ervaring

Even more knowledge

Read our most recent articles

View blog