This course is divided into three modules, each introducing you to new cryptographic concepts which are then followed up with our practical labs. In the first module you will learn about the the evolution of Cryptography, the difference between encoding and encryption and we will introduce you to the different classes of cryptographic ciphers in use today. We will then highlight the key characteristics of cryptographic techniques (Privacy, Authentication, Integrity and Non-Repudiation) before we introduce you to the first of three core cryptographic algorithms; symmetric encryption.
The second module is designed to complement your understanding of symmetric encryption by introducing you to the concept of public key cryptography. You will learn about the key features differentiating symmetric and asymmetric encryption, including their inherent advantages and disadvantages. From here you will learn about the concept of hashing algorithms and understand it’s key properties and how it is used to provide data integrity. The last section of this module will cover the concept of digital signatures, including how they are used to overcome the issue of authentication. We will then expand on one of the most critical components of authentication, by examining the features of a robust and secure password. You will be given tips on the latest password recommendations and associated strategies to ensure your authentication process is secure.
The final module will give you an introduction into how cryptography is applied in our modern world. You will learn about the art of Steganography and be encouraged to apply these concepts on the command line. We will then highlight how data is kept secure as we communicate in the modern digital landscape. The course will conclude by looking at some of the most common cryptographic attacks being used today.
Course Content
