Encryption Fundamentals
- Description
- Curriculum
- Reviews
- Grade
In today’s digital world, data security is more critical than ever. Encryption Fundamentals is a beginner-friendly course designed to help you understand how encryption works, why it matters, and how to implement it in real-world scenarios.
From symmetric and asymmetric encryption to hashing algorithms, you’ll gain a solid foundation in cryptographic principles. Learn how encryption protects sensitive data, ensures secure communications, and safeguards online transactions. This course is ideal for cybersecurity beginners, IT professionals, and anyone looking to enhance their knowledge of modern security techniques.
📌 Key Takeaways:
✅ Learn encryption basics and key cryptographic concepts
✅ Understand symmetric vs. asymmetric encryption methods
✅ Explore real-world applications of encryption (SSL, VPNs, Blockchain)
✅ Get hands-on with common encryption tools & techniques
✅ Protect sensitive data from cyber threats
Start your journey into the world of cryptography and encryption today!
-
1Introduction to Cryptography10:31
-
2Concepts of Information Theory10:42This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
3Building Blocks of Cryptography9:18This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
4Fundamentals of Cryptography Quiz5 questionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
5Introduction to Symmetric Key Cryptography10:56This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
6Common Symmetric Encryption Algorithms13:29This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
7Symmetric Encryption for Bulk Data Transfer8:55This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
8Symmetric Encryption for Secure Data Storage8:33This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
9Symmetric Key Cryptography Quiz5 questionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
10Introduction to Public Key Cryptography10:21This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
11'Hard' Problems in Public Key Cryptography10:37This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
12Common Asymmetric Encryption Algorithms10:36This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
13Public Key Infrastructure10:47This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
14Asymmetric Cryptography for Key Sharing8:55This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
15Public Key Cryptography Quiz5 questionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
16Introduction to Hash Functions10:28This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
17Security Assumptions of Hash Functions11:49This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
18Common Hash Algorithms7:27This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
19Hash Functions for Password Security14:55This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
20Hash Functions for Data Integrity14:31This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
21Hash Functions Quiz5 questionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
22Secure Multi Party Computation11:26This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
23Zero Knowledge Proofs9:50This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
24Post Quantum Cryptography10:57This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
25Ring Signatures14:24This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
26Homomorphic Encryption9:02This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
27Advanced Cryptography Quiz5 questionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
3D Vision Agriculture AI Analytics Artificial Intelligence Authentication Automation Automotive Blockchain Computer Vision Cryptocurrency CV Cybersecurity Data Science Depth Perception Development Digital Identity Energy Sector Ethics FinTech Healthcare Image Processing Insurance IoT Machine Learning ML Motion Analysis Natural Language Processing Neural Networks NFT NLP NN Object Detection Object Recognition Python Real Estate Reinforcement Learning RL Smart Cities Smart Contracts Supply Chain Management Transparency Trust Voting Systems
Search
Working hours
| Monday | 9:30 am - 6.00 pm |
| Tuesday | 9:30 am - 6.00 pm |
| Wednesday | 9:30 am - 6.00 pm |
| Thursday | 9:30 am - 6.00 pm |
| Friday | 9:30 am - 5.00 pm |
| Saturday | Closed |
| Sunday | Closed |