Securing Information using Cryptography

Cybersecurity    |    Beginner
  • 25 Videos | 1h 23m 25s
  • Includes Assessment
  • Earns a Badge
Cryptography is a process used to keep information secret and safe by transforming it into an unrecognizable form that unwanted and unintended recipients cannot understand. In this course, you'll explore how cryptography can be used for confidentiality and integrity. Discover when to use symmetric and asymmetric encryption and discover the advantages and disadvantages of both. Explore practical use cases for cryptography and explore how hashing can be used to ensure data integrity. Discover how digital signatures can provide message integrity, authenticity, and non-repudiation and learn how to implement digital signatures. Discover how to differentiate between rights and permissions and explore access control methods such as discretionary access control, mandatory access control, and role-based access control. Lastly, explore how steganography can be used to hide secret information in or on another object, and how digital rights management (DRM) tools can be used to control access to protected data.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe how cryptography can be used for confidentiality and integrity
    provide an overview of encryption and how it relates to cryptography
    recognize when to use symmetric encryption
    list benefits of asymmetric encryption
    list advantages and disadvantages of asymmetric and symmetric encryption
    provide an overview of how hybrid cryptography can use both asymmetric and symmetric combined
    discuss considerations when securing data using encryption
    discuss practical use cases for cryptography
    recognize how to use hashing to ensure data integrity
    ensure data integrity by performing file hash verifications
    describe how hashing works
    provide an overview of protecting passwords by converting them to hashes
  • discuss how digital signatures can provide message integrity, authenticity, and non-repudiation
    recognize how to implement digital signatures
    describe how permissions are used to explicitly allow access to a resource
    differentiate between permissions and rights
    assign permissions and rights to a resource
    differentiate between centralized and decentralized security management systems
    provide an overview of discretionary access control (DAC)
    recognize when to use mandatory access control (MAC)
    list benefits of the role-based access control (RBAC) permissions approach
    discuss how steganography can be used to hide secret information in or on another object
    recognize how to hide messages in an image using steganography
    describe how digital rights management (DRM) tools can be used to control access to protected data

IN THIS COURSE

  • Playable
    1. 
    Introduction to Data Security
    36s
    UP NEXT
  • Playable
    2. 
    Cryptography Operations
    47s
  • Locked
    3. 
    Fundamentals of Encryption
    8m 2s
  • Locked
    4. 
    Symmetric Encryption
    8m 1s
  • Locked
    5. 
    Asymmetric Encryption
    8m 32s
  • Locked
    6. 
    Asymmetric vs. Symmetric
    1m 58s
  • Locked
    7. 
    Hybrid Encryption Solutions
    1m 30s
  • Locked
    8. 
    Data Encryption Considerations
    41s
  • Locked
    9. 
    Cryptography Use Cases
    4m 40s
  • Locked
    10. 
    Data Integrity Fundamentals
    3m 37s
  • Locked
    11. 
    Performing File Hash Verifications
    2m 35s
  • Locked
    12. 
    The Hashing Process
    1m 43s
  • Locked
    13. 
    Password Storage Protection
    3m 4s
  • Locked
    14. 
    Digital Signatures
    2m 33s
  • Locked
    15. 
    Digital Signature Implementations
    4m 5s
  • Locked