Cryptographic Methods

Beginner
  • 8 videos | 27m 17s
  • Includes Assessment
  • Earns a Badge
Likes 59 Likes 59
Cryptography uses different methods to protect data. Explore different methods used to protect or transmit data securely, and some of the components that ensure data can be protected.

WHAT YOU WILL LEARN

  • describe how OPT, or one-time pad, cryptography can theoretically provide perfect secrecy but has some significant limitations
    describe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphers
    describe and identify the features and use cases for symmetric-key cipher algorithms
    describe and identify the features and use cases for asymmetric-key cipher algorithms
  • describe the use of steganography in encryption products to hide the fact data is even encrypted
    describe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrity
    describe a digital signature and how it can be used for authentication and non-repudiation
    identify the cryptographic algorithm to use

IN THIS COURSE

  • 3m 47s
    Upon completion of this video, you will be able to describe how OPT, or one-time pad, cryptography can theoretically provide perfect secrecy, but has some significant limitations. FREE ACCESS
  • 4m 8s
    Upon completion of this video, you will be able to describe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphers. FREE ACCESS
  • Locked
    3.  Using Symmetric Algorithms
    2m 34s
    Upon completion of this video, you will be able to describe and identify the features and use cases for symmetric key cipher algorithms. FREE ACCESS
  • Locked
    4.  Working with Asymmetric Algorithms
    3m 24s
    Upon completion of this video, you will be able to describe and identify the features and use cases for asymmetric key cipher algorithms. FREE ACCESS
  • Locked
    5.  Hiding Data Using Steganography
    4m 20s
    Upon completion of this video, you will be able to describe the use of steganography in encryption products to hide the fact that data is even encrypted. FREE ACCESS
  • Locked
    6.  Using One-way Hashes
    2m 58s
    After completing this video, you will be able to describe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrity. FREE ACCESS
  • Locked
    7.  Describing Digital Signatures
    2m 50s
    Upon completion of this video, you will be able to describe a digital signature and how it can be used for authentication and to prevent denial. FREE ACCESS
  • Locked
    8.  Exercise: Identify the Cryptographic Algorithm used
    3m 17s
    During this video, you will learn how to identify the appropriate cryptographic algorithm to use. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 76 Likes 76  
Likes 108 Likes 108  
Likes 40 Likes 40  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 55 Likes 55  
Likes 966 Likes 966