Cybersecurity
Samer
Cryptography
Learn the principles and techniques of modern cryptography
Samer Aoudi
Available Apr 2023 English 0

Register »

Course Description

This course covers the principles and techniques of modern cryptography, including topics such as symmetric and asymmetric encryption, hash functions, and digital signatures.



Learning Outcomes
Upon completion of Introduction to Information Security, students will be able to:
  1. Demonstrate an understanding of the principles and technologies of cryptography, including topics such as encryption, key management, and cryptographic protocols.
  2. Apply cryptographic techniques to secure data and communications, including the use of symmetric and asymmetric encryption.
  3. Evaluate the security of cryptographic systems and protocols, and identify and assess vulnerabilities.
  4. Develop and implement a cryptographic security plan that addresses the specific needs and risks of an organization.
Prerequisite Knowledge: Introduction to Information Security
Requirements: TBA
Duration: 0 hours
Files: Kali Linux, Windows 10 Target, Metasploitable 2
Course Access
Digital Book
Read
Full access to digital learning materials              
YouTube Channel
Watch
Dedicated YouTube Playlist for web application security
Apply
Apply
Apply your knowledge in a contrlled lab environment    
Course Outline
Target Audience

This course is suitable for students with a background in computer science or mathematics who are interested in learning about the principles and techniques of modern cryptography.

Edition

This is the first edition of the book. Published on January 7, 2023

Course Modules

Module 1 - Introduction to Cryptography: This module covers the basic concepts and principles of cryptography, including types of cryptographic techniques and algorithms, and common cryptography tools and technologies.

Module 2 - Cryptographic Techniques: This module covers the principles and practices of symmetric and asymmetric encryption, as well as key management.

Module 3 - Cryptographic Protocols: This module covers the cryptographic protocols that are used to secure communication, authentication, and data storage and transmission.

Module 4 - Cryptography and Security: This module covers the role of cryptography in various aspects of security, including network security, application security, and cloud security.

Module 5 - Cryptography Planning and Implementation: This module covers the process of developing and implementing a cryptographic security plan, including the selection and deployment of cryptographic controls and countermeasures, and the testing and maintenance of cryptographic security.

Legal

Some of the product names and company names used in this course have been used for identification purposes only and may be trademarks or registered trademarks of their respective organizations. The software tools and applications in this course are for instructional purposes only. They have been tested with care, but are not guaranteed for any particular intent beyond educational purposes. The author does not offer any warranties or representations, nor does he accept any liabilities with respect to the programs.
© 2022-2023 Samer Aoudi

#cybersecurity #etextbook #websecurity #pentesting #onlinelessons
Ads By Google
               
© Samer Aoudi 2005-2024

Cryptography