Cryptography Course
1 hour, 6 minutes
Syllabus
                                    Cryptography intro
                                    Video - 00:01:00
                                        
                                            
                                        
                                
                                    
                                            
What do we mean when we talk about cryptography? We'll start with a brief discussion of the difference between hashing and encryption.
                                        
                                    
                                    Password hashing
                                    Video - 00:09:00
                                        
                                            
                                        
                                
                                    
                                            
Take a deep dive into how we use hashing to protect passwords.
                                        
                                    
                                    Hashing + demo
                                    Video - 00:10:00
                                        
                                            
                                        
                                
                                    
                                            
We've discussed hashing, but what does it look like in action? Tommy demonstrates a hashing algorithm.
                                        
                                    
                                    Encryption: symmetric
                                    Video - 00:06:00
                                        
                                            
                                        
                                
                                    
                                            
Tommy discusses symmetric encryption in depth.
                                        
                                    
                                    Encryption: asymmetric
                                    Video - 00:08:00
                                        
                                            
                                        
                                
                                    
                                            
Tommy discusses asymmetric encryption using public and private keys.
                                        
                                    
                                    PKI and certificates
                                    Video - 00:08:00
                                        
                                            
                                        
                                
                                    
                                            
What is PKI and how do certificates and certificate authorities come into play?
                                        
                                    
                                    PKI demo
                                    Video - 00:06:00
                                        
                                            
                                        
                                
                                    
                                            
Take a look at PKI and certificates in the real world.
                                        
                                    
                                    Uses of cryptography
                                    Video - 00:11:00
                                        
                                            
                                        
                                
                                    
                                            
How do we use cryptography in cybersecurity? We'll explore code signing, digital signatures and blockchain.
                                        
                                    
                                    Cryptographic tools
                                    Video - 00:06:00
                                        
                                            
                                        
                                
                                    
                                            
Explore various cryptographic tools, including trusted platform modules, hardware security modules, key management and secure enclaves.
                                        
                                    
Unlock 7 days of free training
                            - 1,400+ hands-on courses and labs
 - Certification practice exams
 - Skill assessments
 
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
 - 100s of hands-on labs in cloud-hosted cyber ranges
 - Custom certification practice exams (e.g., CISSP, Security+)
 - Skill assessments
 - Infosec peer community support
 
Infosec Skills Teams
Book a meeting to get a custom quote
- Team administration and reporting
 - Dedicated client success manager
 - 
                                
                                Single sign-on (SSO)
                                    
                                        Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
 - 
                                
                                Integrations via API
                                    
                                        Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
 - 190+ role-guided learning paths and assessments (e.g., Incident Response)
 - 100s of hands-on labs in cloud-hosted cyber ranges
 - Create and assign custom learning paths
 - Custom certification practice exams (e.g., CISSP, CISA)
 - Optional upgrade: Guarantee team certification with live boot camps
 
Award-winning training you can trust