Introduction to Cryptography (Self-Paced Tutorial)

Learn the inner workings of security encryption and cryptographic systems and how to correctly use them in real-world applications through hands-on experience via live virtual machine labs, lab simulations, and case projects.
SHARE
3 Months / 12 Course Hrs
Open Enrollment
Offered in partnership with your preferred school

ed2go

Why this school?The school has been chosen based on your location or if you've visited this school's website.Change School
Learning method

Introduction to Cryptography (Self-Paced Tutorial)

Course code: T9073

The importance of protecting information and data makes it into headlines every day. Cryptography is the practice of techniques used to protect the secure transmission of information. This course is an excellent starting point to understand what cryptography is, learn how cryptography used, and understand hash, symmetric, and asymmetric cryptographic algorithms.

This course not only covers the fundamentals of cryptography, but also provides a hands-on experience through the use of live virtual machine labs, lab simulations, and case projects. Hands-on projects will have you use stenography to send a hidden message, use a has generator, and even have you use Microsoft's Encrypting File System.

A basic knowledge of cryptography is needed for many careers such as cyber security, software development, computer networks, and database administration.

Don't just learn about cryptography, roll your sleeves up, and get to actually so cryptography with the labs, simulations, and projects in this course.

What you will learn

  • Learn the fundamentals of cryptography
  • Hands-on experience in security encryption and cryptographic systems

How you will benefit

  • A basic knowledge is needed for many careers such as cyber security, software development, computer networks, and database administration

How the course is taught

  • Self-paced, online course
  • 3 Months access
  • 12 course hours
  1. Defining Cryptography
    1. What is Cryptography
    2. Cryptography and Security
  2. Cryptographic Algorithms
    1. Hash Algorithms
    2. Symmetric Cryptographic Algorithms
    3. Asymmetric Cryptographic Algorithms
  3. Using Cryptography
    1. Encryption through Software
    2. Hardware Encryption
  4. Summary
    1. Hands-On Projects
    2. Case Projects
  5. Lab Simulations
  6. Live Virtual Machine Lab
  7. Review
  8. Final Exam
  • Internet access
  • Email
  • One of the following browsers:
    • Mozilla Firefox
    • Microsoft Internet Explorer (9.0 or above)
    • Google Chrome
    • Safari
  • Adobe PDF plugin (a free download obtained at Adobe.com.)

You can start this course at any time your schedule permits.

You have 3 month access to the course. After enrolling, you can learn and complete the course at your own pace, within the allotted access period.

There is no time limit to complete each lesson, other than completing all lessons within the allotted access period.

Because this course is self-paced, no extensions will be granted after the start of your enrollment.