Description
Course info
Rating
(105)
Level
Intermediate
Updated
Jun 7, 2017
Duration
1h 24m
Description

Securing electronic communications is vital to ensuring that information is protected as it traverses the network. In this course, Cryptography: The Big Picture, you'll learn how cryptography fits into an overall security strategy for any business or government entity. First, you'll dive into learning about the history of cryptography. Next, you'll explore all the different types of cryptographic algorithms. Finally, you'll discover how you can start using cryptography to start protecting your information today. By the end of this course, you'll know how encryption plays a vital role in the security strategy of any business.

About the author
About the author

Matt Glass is a Multi-national Systems Integrator in Stuttgart, Germany, working as a government contractor. He has been working in the IT field for the last eight years.

More from the author
Lateral Movement with WMIOps
Intermediate
24m
Jun 22, 2020
Getting Started with Snort
Beginner
1h 6m
Jun 3, 2020
Lateral Movement with PsExec
Intermediate
21m
May 1, 2020
More courses by Matt Glass
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello, I'm Matt Glass, and welcome to my course, Cryptography: The Big Picture. I'm a senior system analyst with a defense contractor in Sacramento, California. I have held a few different IT roles both in the military and now as a civilian. Cryptography has been a subject of debate recently, in particular here in the United States. With all the negative attention it gets, I wouldn't be surprised if you associated it with hackers, the dark web, or criminals trying to hide their activity online. Let me start by saying that while cryptography can enable all those things to exist, it is still an important part of information security and something you use everyday to protect your personal information. This course offers an introduction to cryptographic concepts, algorithms, and a few examples of practical applications in any organization. At the end of each module, we'll talk about how to apply these concepts in a scenario so you can learn how to think like a cryptographic consultant when a company asks you to assists with information security planning. I also have a few demos prepared to show you how to put some of the concepts into practice today. This course is a big-picture course, so this is not a deep dive into the mathematical concepts behind each algorithm or a comprehensive list of all available cryptographic technologies. Instead, the focus is on learning some of the basics, but more important, how to evaluate security requirements and cryptographic algorithms to select the best solution for each situation. There are no prerequisites for this course. It is designed for anyone who wants to learn more about cryptography and how it fits into the information security plan for any organization. I really enjoyed creating this course, and I hope that you enjoy watching it.