A to Z of Cryptography
- Description
- Curriculum
- FAQ
- Reviews
This a detailed course on Cryptography, which is a way to secure important information and communication through codes. These codes are only available to the rightful owner and hence it can be used to combat attacks, and protect your data from hackers. Every organization, regardless of size, industry or infrastructure, requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today. Network security is a comprehensive aspect that shelters a multitude of technologies, devices and processes involved in computer networks. With the advent of Internet and world wide web our interconnected computers are prone to threats and attacks through the system vulnerabilities and this in turn can hamper the activities of an organization or even an individual. In its simplest term, network security comprises a set of rules and configurations designed to protect the confidentiality, integrity and availability of computer networks and data using both software and hardware technologies.
There are several reasons to learn network security and cryptography.
In our everyday lives, cryptography is used extensively and is ubiquitous. Say for example, we may use it to securely shoot passwords over massive networks for online shopping. It is used in financial transaction in banks where Bank servers and e-mail clients save your passwords using cryptography. Cryptography is used to secure all transmitted information in our IoT-connected world, to authenticate people and devices, and devices to other devices.
In this course I will take you through a tour of various cryptographic techniques.
There are basically 2 types of cryptographic systems. Symmetric key cryptosystem and asymmetric key cryptosystem. In symmetric key cryptosystem there is a single key used for encryption as well as decryption. In asymmetric key cryptosystem, there is a pair of keys- one used for encryption and the other for decryption. Encryption is the process of converting the plaintext or original message to ciphertext or coded message whereas decryption converts the ciphertext back to plaintext. So, encryption is used at the sender side whereas decryption is used at the receiver side. Towards the end of the course some complex research related cryptographic topics have been discussed that will be beneficial to the researchers and advanced learners.
-
1About the Section on Introduction to Network SecurityVideo lesson
This video gives an overview of Section 1
-
21.1 IntroductionVideo lesson
This video gives an understanding about the need for network security and related aspects.
-
31.2 Network AttacksVideo lesson
This video explains various types of network attacks.
-
41.3 Network Security ServicesVideo lesson
This video explains the various categories of security services.
-
51.4 Malware Types Part 1Video lesson
This video explains definition, usage and few types of malware attacks.
-
61.5 Malware Types Part 2Video lesson
This video explains other types of malware attacks.
-
71.6 Malware SpreadVideo lesson
This video explains the methods spread of malware in various computer systems.
-
81.7 Malware ProtectionVideo lesson
This video explains the protection mechanisms against malware attacks.
-
91.1 Hands-on Malware AnalysisVideo lesson
-
10Network SecurityQuiz
-
11Overview of Section 2Video lesson
This video gives an overview of Section 2
-
122.1 Classical CryptosystemVideo lesson
This video gives a short description of a Single Round Function used for DES algorithm.
-
132.1 Hands-on with Python-Caesar Cipher, Reverse Cipher, Caesar Hacker, ROT13Video lesson
-
142.2 Playfair CipherVideo lesson
-
152.2 Hands-on with Python-Playfair CipherVideo lesson
-
162.3 Single Round FunctionVideo lesson
-
172.4 Data Encryption Standard (DES)Video lesson
This video teaches DES algorithm.
-
182.3 Hands-on with Python-DESVideo lesson
-
192.5 Substitution Cipher-Hill CipherVideo lesson
-
202.4 Hands-on with Python-Hill CipherVideo lesson
-
212.6 Substitution Cipher-Vigenere CipherVideo lesson
-
222.5 Hands-on with Python-Vigenere CipherVideo lesson
-
232.7 Transposition Cipher-Rail FenceVideo lesson
-
242.8 Transposition Cipher-Advanced Rail FenceVideo lesson
-
252.6 Hands-on with Python-Rail FenceVideo lesson
-
26Cryptography Part 1Quiz
-
27Overview of Section 3Video lesson
This video gives an overview of Section 3
-
283.1 IDEAVideo lesson
-
293.2 RC5Video lesson
-
303.3 MACVideo lesson
-
313.4 Hash BasicsVideo lesson
This video gives basics of Hash algorithm and its properties.
-
323.5 Hash DesignVideo lesson
This video gives the description of design principles of Hash algorithm.
-
333.6 Hash ApplicationsVideo lesson
This video highlights the applications of Hash algorithm.
-
343.2 Hands-on with Python-SHAVideo lesson
-
353.7 MD5 StepsVideo lesson
-
363.8 MD5 ArchitectureVideo lesson
-
373.9 MD5 Implementation StepsVideo lesson
-
383.3 Hands-on with Python-MD5Video lesson
-
393.10 Public Key Cryptosystem - RSAVideo lesson
-
403.4 Hands-on with Python - RSAVideo lesson
-
413.11 Diffie HellmanVideo lesson
-
423.12 Primitive RootsVideo lesson
-
433.5 Hands-on Diffie HellmanVideo lesson
-
44Cryptography Part 2Quiz

External Links May Contain Affiliate Links read more