Defining Cryptography

  • 16 Videos | 1h 2m 27s
  • Includes Assessment
  • Earns a Badge
Likes 50 Likes 50
Cryptography, and understanding its limits and pitfalls, is essential to protecting data. Discover how cryptography can be used to protect and secure data, as well as the importance of data integrity and key generation.

WHAT YOU WILL LEARN

  • describe and identify the reasons for having and using cryptography
    recognize historical uses of cryptography and their relevance to cryptography today
    use and identify basic cryptographic terminology
    describe why cryptography is difficult to get right and how poor cryptography can give you a false sense of security
    identify the different types of cryptography and how cryptographic algorithms can be verified and validated
    describe basic export controls and limits that can be imposed on cryptography used around the world
    describe how cryptography can keep data confidential within limits
    describe why data integrity is an integral part of cryptography
  • define how cryptography can provide a means to authenticate an entity
    describe how cryptography can be used to prove, with high certainty, that an action or statement is associated with an entity
    recognize the difference between blocks and key sizes as they apply to cipher algorithms
    describe and perform padding operations to data for block ciphers
    describe how to encode encrypted data for easier storage or transport
    describe the purpose of an Initialization Vector for a cipher algorithm and how nonces can be used to protect small datasets
    describe how entropy is used in generating random numbers and how that entropy is critical to the strength of a cryptographic key
    describe the creating, or generating, of keys and how the key strength is critical to cryptographic ciphers

IN THIS COURSE

  • Playable
    1. 
    Introducing Cryptography
    5m 42s
    UP NEXT
  • Playable
    2. 
    Identifying Historical Use of Cryptography
    3m 14s
  • Locked
    3. 
    Describing Cryptographic Terminology
    4m 46s
  • Locked
    4. 
    Defining Why Cryptography is Difficult
    5m 25s
  • Locked
    5. 
    Identifying the Current State of Cryptography
    2m 44s
  • Locked
    6. 
    Describing Export Controls on Cryptography
    2m 16s
  • Locked
    7. 
    Describing How Cryptography Provides Confidentiality
    3m 17s
  • Locked
    8. 
    Recognizing the Need for Data Integrity
    3m 27s
  • Locked
    9. 
    Defining Cryptography Authentication
    2m 39s
  • Locked
    10. 
    Applying Non-repudiation to Cryptography
    2m 48s
  • Locked
    11. 
    Distinguishing between Block and Key Sizes
    2m 35s
  • Locked
    12. 
    Using Padding
    5m 40s
  • Locked
    13. 
    Formatting the Output
    2m 20s
  • Locked
    14. 
    Using Nonces and the Initialization Vector
    2m 19s
  • Locked
    15. 
    Identifying and Using Entropy
    2m 9s
  • Locked
    16. 
    Creating or Generating Keys
    3m 8s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 0 Likes 0  
Likes 148 Likes 148  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 132 Likes 132  
Likes 49 Likes 49  
Likes 354 Likes 354