Cryptography is an important part of information security planning. This course will teach you some of the basics of cryptographic algorithms and how to select the appropriate one to encrypt your data.
Securing electronic communications is vital to ensuring that information is protected as it traverses the network. In this course, Cryptography: The Big Picture, you'll learn how cryptography fits into an overall security strategy for any business or government entity. First, you'll dive into learning about the history of cryptography. Next, you'll explore all the different types of cryptographic algorithms. Finally, you'll discover how you can start using cryptography to start protecting your information today. By the end of this course, you'll know how encryption plays a vital role in the security strategy of any business.
Course Overview Hello, I'm Matt Glass, and welcome to my course, Cryptography: The Big Picture. I'm a senior system analyst with a defense contractor in Sacramento, California. I have held a few different IT roles both in the military and now as a civilian. Cryptography has been a subject of debate recently, in particular here in the United States. With all the negative attention it gets, I wouldn't be surprised if you associated it with hackers, the dark web, or criminals trying to hide their activity online. Let me start by saying that while cryptography can enable all those things to exist, it is still an important part of information security and something you use everyday to protect your personal information. This course offers an introduction to cryptographic concepts, algorithms, and a few examples of practical applications in any organization. At the end of each module, we'll talk about how to apply these concepts in a scenario so you can learn how to think like a cryptographic consultant when a company asks you to assists with information security planning. I also have a few demos prepared to show you how to put some of the concepts into practice today. This course is a big-picture course, so this is not a deep dive into the mathematical concepts behind each algorithm or a comprehensive list of all available cryptographic technologies. Instead, the focus is on learning some of the basics, but more important, how to evaluate security requirements and cryptographic algorithms to select the best solution for each situation. There are no prerequisites for this course. It is designed for anyone who wants to learn more about cryptography and how it fits into the information security plan for any organization. I really enjoyed creating this course, and I hope that you enjoy watching it.
Symmetric Key Cryptography Hello again, and welcome to module two, Symmetric Key Cryptography. We just finished covering some of the basic concepts of cryptography, and now we're going to see how they apply to modern cryptographic algorithms. To start, let's check out the overview for this module. To begin, I'm going to cover the basics of symmetric key cryptography. I'm going to explain what makes it symmetrical and show you a simplified diagram of how the encryption and decryption process works. After that, we're going to take a look at some symmetric algorithms. I'll be explaining the differences between algorithms like DES, AES, and Blowfish, as well as discussing a little history of each. I'll also be talking about some of the strengths and weaknesses of each algorithm compared to the others. Once we finish that, I'm going to move into the strengths and weaknesses of symmetric key cryptography itself, and how it fits into our scenario. Finally at the end of the module, I have a little demo for you showing how you can use symmetric key cryptography to encrypt your files. But before we begin, let's take a quick look at our scenario again. Remember, we have our company Globomantics, a new online storage and messaging service offering their clients the ability to store files and send emails securely across the internet. You are acting as their cryptographic consultant, and in this module, you're considering where you might recommend symmetric key cryptography to protect portions of their communications from anyone who might be looking to intercept them. Not only are you going to be recommending when to use symmetric key cryptography, you're going to be recommending specific algorithms to Globomantics for each part. So if you're ready to help them out, let's get going with symmetric cryptography basics.
Asymmetric Key Cryptography Hello, and welcome to module three, Asymmetric Key Cryptography. In this module, we're going to learn about asymmetric encryption methods and algorithms, public and private keys, and of course, how all of this ties into our scenario. With that in mind, let's get started. In this module, we're going to start by going over the basics of asymmetric key cryptography. We're going to talk about what makes it asymmetric, and describe the asymmetric encryption process. Next, we're going to learn about some of the asymmetric algorithms we might recommend in our scenario. Then, we're going to go over the strengths and weaknesses of asymmetric algorithms and how we can use them in our scenario. Finally, we have our demo for this module. Now, as we're going through this module, I want you to keep the scenario in mind and remember the weaknesses that we need to address from the previous module. We are looking for solutions to key management, digital signatures, message encryption and authentication, and we're still working on a solution for website security. With that in mind, let's begin with asymmetric key cryptography basics.
That’s Confidentiality, but What About Integrity? Hello again, and welcome to module four of this course on using cryptography to ensure data integrity. In the last few modules, we've been looking at how cryptography can provide confidentiality, the security aspect most associated with it. In the last module though, we started to see how some algorithms also supported methods of ensuring data integrity. In this module, we're going to look at hashing algorithms and take a closer look at digital signatures as well to see how all of these cryptographic solutions can help us develop a security plan for Globomantics. But first, let's take a look at the overview for this module. We're going to start by taking a look at the basics of data integrity. We'll start with a brief lesson on what hashing is and how it works, then we're going to talk about message authentication code and learn about how it ties a few of the other concepts together. After that, we're going to discuss a few hashing algorithms, like MD5 and SHA, which we want to recommend Globomantics. Once we understand those concepts, we're going to take a closer look at digital signatures and public key infrastructure, or PKI, and see how these technologies fill in the remaining gaps in our cryptographic security plan. Along the way, I have our demo for this module on hashing. As with previous modules, make sure you keep the scenario in mind as we learn about these concepts and think about how each technology would fit in to enhance the security measures we already discussed.