Cryptography
Learn the principles and techniques of modern cryptography
Samer Aoudi
Available Apr 2023 English 0
Course Description
This course covers the principles and techniques of modern cryptography, including topics such as symmetric and asymmetric encryption, hash functions, and digital signatures.
Learning Outcomes
Course Access
Read
Full access to digital learning materials
Watch
Dedicated YouTube Playlist for web application security
Apply
Apply your knowledge in a contrlled lab environment
Course Outline
Target Audience
This course is suitable for students with a background in computer science or mathematics who are interested in learning about the principles and techniques of modern cryptography.
Edition
This is the first edition of the book. Published on January 7, 2023
Course Modules
Module 1 - Introduction to Cryptography:
This module covers the basic concepts and principles of cryptography, including types of cryptographic techniques and algorithms, and common cryptography tools and technologies.
Module 2 - Cryptographic Techniques:
This module covers the principles and practices of symmetric and asymmetric encryption, as well as key management.
Module 3 - Cryptographic Protocols:
This module covers the cryptographic protocols that are used to secure communication, authentication, and data storage and transmission.
Module 4 - Cryptography and Security:
This module covers the role of cryptography in various aspects of security, including network security, application security, and cloud security.
Module 5 - Cryptography Planning and Implementation:
This module covers the process of developing and implementing a cryptographic security plan, including the selection and deployment of cryptographic controls and countermeasures, and the testing and maintenance of cryptographic security.
Legal
Some of the product names and company names used in this course have been used for identification purposes only and may be trademarks or registered trademarks of their respective organizations. The software tools and applications in this course are for instructional purposes only. They have been tested with care, but are not guaranteed for any particular intent beyond educational purposes. The author does not offer any warranties or representations, nor does he accept any liabilities with respect to the programs.
© 2022-2023 Samer Aoudi
#cybersecurity #etextbook #websecurity #pentesting #onlinelessons
Ads By Google