Cryptography is an important part of information security planning. This course will teach you some of the basics of cryptographic algorithms and how to select the appropriate one to encrypt your data.
Securing electronic communications is vital to ensuring that information is protected as it traverses the network. In this course, Cryptography: The Big Picture, you'll learn how cryptography fits into an overall security strategy for any business or government entity. First, you'll dive into learning about the history of cryptography. Next, you'll explore all the different types of cryptographic algorithms. Finally, you'll discover how you can start using cryptography to start protecting your information today. By the end of this course, you'll know how encryption plays a vital role in the security strategy of any business.
Course Overview Hello, I'm Matt Glass, and welcome to my course, Cryptography: The Big Picture. I'm a senior system analyst with a defense contractor in Sacramento, California. I have held a few different IT roles both in the military and now as a civilian. Cryptography has been a subject of debate recently, in particular here in the United States. With all the negative attention it gets, I wouldn't be surprised if you associated it with hackers, the dark web, or criminals trying to hide their activity online. Let me start by saying that while cryptography can enable all those things to exist, it is still an important part of information security and something you use everyday to protect your personal information. This course offers an introduction to cryptographic concepts, algorithms, and a few examples of practical applications in any organization. At the end of each module, we'll talk about how to apply these concepts in a scenario so you can learn how to think like a cryptographic consultant when a company asks you to assists with information security planning. I also have a few demos prepared to show you how to put some of the concepts into practice today. This course is a big-picture course, so this is not a deep dive into the mathematical concepts behind each algorithm or a comprehensive list of all available cryptographic technologies. Instead, the focus is on learning some of the basics, but more important, how to evaluate security requirements and cryptographic algorithms to select the best solution for each situation. There are no prerequisites for this course. It is designed for anyone who wants to learn more about cryptography and how it fits into the information security plan for any organization. I really enjoyed creating this course, and I hope that you enjoy watching it.