MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Cryptography Fundamentals for Developers and Security Professionals

Course Summary

Cryptography ensures confidentiality and authenticity of digital documents. The mathematics behind cryptography show us why, and how far, it can be trusted.


  • +

    Course Syllabus

    History of Cryptography
    - 36m 20s

    —Introduction 2m 13s
    —One-Time Pads 3m 8s
    —Entropy 4m 42s
    —The Enigma Machine 3m 42s
    —Cryptanalysis 5m 42s
    —Diffie-Hellman 9m 17s
    —Diffie-Hellman Example 5m 44s
    —Conclusion 1m 48s
    Algorithms
    - 53m 14s

    —Introduction 0m 35s
    —Block Ciphers 2m 9s
    —Confusion and Key Schedules 1m 13s
    —Diffusion and Cipher Block Chaining 1m 44s
    —Initialization Vectors 1m 2s
    —DES 1m 11s
    —AES 2m 36s
    —Modern Cryptanalysis 2m 7s
    —Compression and Error Correction 3m 58s
    —Public and Private Keys 2m 59s
    —Inverse Exponents Example 2m 27s
    —Finding Inverse Exponents 4m 45s
    —The RSA Algorithm 2m 21s
    —Patterns in RSA 2m 32s
    —Discrete Logarithm Problem 5m 32s
    —Elliptic Curve 3m 23s
    —Digital Signatures 2m 30s
    —Hashing Algorithms 2m 21s
    —Birthday Attack 4m 4s
    —Trust 2m 19s
    —Summary 1m 18s
    APIs
    - 36m 25s
    Transport Layer Security
    - 22m 8s
    Authentication and Authorization
    - 40m 1s
    Case Studies
    - 28m 56s
    Decentralized Systems
    - 37m 28s


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url