Course info
Aug 23, 2018
2h 24m

Security is vastly important in today's world. In this course, Practical Encryption and Cryptography Using Python, you will learn the practical aspect of cryptography using the amazing programming language Python, and you will gain the confidence to master the skill of crypto by using real-life examples. First, you will learn about hashing algorithms. Next, you will discover Symmetric Encryption using Python. Finally, you will explore the multiple angles of Asymmetric Encryption using public and private keys. When you're finished with this course, you will have the necessary skills and knowledge about cryptography to use in your career.

About the author
About the author

Gus is an IT expert specialized in programming and security. He's a passionate blogger, geek, and loves what he's doing.

More from the author
More courses by Gus Khawaja
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Gus Khawaja, and welcome to this course of Practical Encryption and Cryptography Using Python. People think that this subject is very complex, but in this course, you will see how simple it is and practical at the same time. I know you want to learn about this topic, and that's why you're watching this video, right? In each lesson, we are going to see together how to understand crypto categories using Python. Some of the major topics that we will cover include hashing and secure algorithms, symmetric encryption in Python, cracking secure ciphers using hashcat, asymmetric encryption using Python, and much, much more. When finishing all the modules in this course, you should grasp the basics of cryptography using Python and understand how to use it in practice. Before beginning this amazing journey, you should be familiar with the essentials of Python, but don't worry, I will walk you through all the details. Join me on this course to learn some exciting stuff with Cryptography Using Python.

Symmetric Encryption
Sit back and relax, because in this module you will learn a lot of interesting materials related to encryption. This type of cipher is one that was first used in the old days, even before computers were discovered, and of course, still used heavily in our modern age. I will not go into the details right now, but I will give you a quick definition of symmetric encryption. In summary, for this type of encryption, you will use a secret key to encrypt a cleartext data, then using the same key, you will decrypt and reveal the text to its original state. If you didn't understand it, that's fine. You will visualize everything later in this module. That being said, in the next demo, I will explain in more detail about the symmetric encryption.

Asymmetric Encryption
Asymmetric encryption is an amazing invention in security. For example, it allows you to communicate securely over the internet using SSL. In fact, HTTPS is just one example, and in this module, I will walk you through all the practical details that you need to know for applying it in your career. Now, in the previous module, you learned how to use one key for encryption, right? In this one, you will learn how to use two keys instead of one. I won't give too much details for now. I invite you to follow me to the next demo to get all the information needed about this type of encryption.

Cryptography in Practice
This is the last module in this course folks, and I hope that you enjoyed it so far as much as I did. This module is a continuation of the previous one. The public and private keys concept is very hard to grasp, and I included more practical examples in this module to show you how to deal with asymmetric cryptography in your daily career. That being said, let's jump in and start this module with more practical scenarios.