Defining Cryptography

Beginner
  • 16 videos | 54m 27s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 129 users Rating 4.6 of 129 users (129)
Cryptography, and understanding its limits and pitfalls, is essential to protecting data. Discover how cryptography can be used to protect and secure data, as well as the importance of data integrity and key generation.

WHAT YOU WILL LEARN

  • Describe and identify the reasons for having and using cryptography
    Recognize historical uses of cryptography and their relevance to cryptography today
    Use and identify basic cryptographic terminology
    Describe why cryptography is difficult to get right and how poor cryptography can give you a false sense of security
    Identify the different types of cryptography and how cryptographic algorithms can be verified and validated
    Describe basic export controls and limits that can be imposed on cryptography used around the world
    Describe how cryptography can keep data confidential within limits
    Describe why data integrity is an integral part of cryptography
  • Define how cryptography can provide a means to authenticate an entity
    Describe how cryptography can be used to prove, with high certainty, that an action or statement is associated with an entity
    Recognize the difference between blocks and key sizes as they apply to cipher algorithms
    Describe and perform padding operations to data for block ciphers
    Describe how to encode encrypted data for easier storage or transport
    Describe the purpose of an initialization vector for a cipher algorithm and how nonces can be used to protect small datasets
    Describe how entropy is used in generating random numbers and how that entropy is critical to the strength of a cryptographic key
    Describe the creating, or generating, of keys and how the key strength is critical to cryptographic ciphers

IN THIS COURSE

  • 5m 42s
  • 3m 14s
  • Locked
    3.  Describing Cryptographic Terminology
    4m 46s
  • Locked
    4.  Defining Why Cryptography is Difficult
    5m 25s
  • Locked
    5.  Identifying the Current State of Cryptography
    2m 44s
  • Locked
    6.  Describing Export Controls on Cryptography
    2m 16s
  • Locked
    7.  Describing How Cryptography Provides Confidentiality
    3m 17s
  • Locked
    8.  Recognizing the Need for Data Integrity
    3m 27s
  • Locked
    9.  Defining Cryptography Authentication
    2m 39s
  • Locked
    10.  Applying Non-repudiation to Cryptography
    2m 48s
  • Locked
    11.  Distinguishing between Block and Key Sizes
    2m 35s
  • Locked
    12.  Using Padding
    5m 40s
  • Locked
    13.  Formatting the Output
    2m 20s
  • Locked
    14.  Using Nonces and the Initialization Vector
    2m 19s
  • Locked
    15.  Identifying and Using Entropy
    2m 9s
  • Locked
    16.  Creating or Generating Keys
    3m 8s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 134 users Rating 4.4 of 134 users (134)
Rating 4.6 of 1991 users Rating 4.6 of 1991 users (1991)
Rating 4.2 of 180 users Rating 4.2 of 180 users (180)