Cryptography: Introduction to Cryptography Services

Cryptography    |    Beginner
  • 14 Videos | 1h 2m 23s
  • Includes Assessment
  • Earns a Badge
Likes 38 Likes 38
Learners will discover two core cryptography services, encryption and hashing, in this 14-video course. Examine the goals of information security, symmetric and asymmetric encryption, and using the Caesar cipher. Begin by taking a look at the goals of information security. Then explore cryptography services and how to associate those services with goals of information security, and receive an overview of encryption and encryption history. Next, watch a demonstration of how to use the CrypTool and the Caesar cipher. Following this, you will examine symmetric encryption, and define common symmetric encryption algorithms. Another demonstration covers CrypTool and symmetric encryption. Learners will be introduced to asymmetric encryption; learn how to define common asymmetric encryption algorithms; and explore the purpose of hashing, and define common hashing algorithms. The final tutorial demonstrates use of the CrypTool and hashing. The concluding exercise involves downloading and installing CrypTool v1, creating a text file, creating an MD5 and SHA1 hash of the file, changing the file and checking the hash value again, and encrypting text with Caesar cipher.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    define the goals of information security
    describe cryptography services and associate those services with the goals of information security
    describe encryption and encryption history
    use CrypTool and the Caesar cipher
    describe symmetric encryption
    define common symmetric encryption algorithms
  • demonstrate CryptTool and symmetric encryption
    describe asymmetric encryption
    define common asymmetric encryption algorithms
    describe the purpose of hashing
    define common hashing algorithms
    use CryptTool and hashing
    download and install CrypTool v1, create a text file, create an MD5 and SHA1 hash of the file, change the file and check the hash value again, and encrypt text with Caesar cipher

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 55s
    UP NEXT
  • Playable
    2. 
    Goals of Information Security
    3m 23s
  • Locked
    3. 
    Introducing Cryptography Services
    2m 58s
  • Locked
    4. 
    Encryption Overview
    8m 10s
  • Locked
    5. 
    Demo: Caesar Cipher
    6m 46s
  • Locked
    6. 
    Introducing Symmetric Encryption
    3m 1s
  • Locked
    7. 
    Symmetric Encryption Algorithms
    2m 55s
  • Locked
    8. 
    Demo: Symmetric Encryption
    4m 7s
  • Locked
    9. 
    Introducing Asymmetric Encryption
    2m 9s
  • Locked
    10. 
    Asymmetric Encryption Algorithms
    1m 23s
  • Locked
    11. 
    Introduction to Hashing
    2m 46s
  • Locked
    12. 
    Common Hashing Algorithms
    2m 3s
  • Locked
    13. 
    Demo: Hashing
    7m 8s
  • Locked
    14. 
    Exercise: Encryption and Hashing
    7m 39s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 59 Likes 59  
Likes 36 Likes 36