Cryptography Fundamentals for Developers and Security Professionals
Pluralsight
Course Summary
Cryptography ensures confidentiality and authenticity of digital documents. The mathematics behind cryptography show us why, and how far, it can be trusted.
-
+
Course Description
The Java and .NET frameworks contain all the algorithms you need to keep your users' data secret from prying eyes. Web servers like Apache, Tomcat, and IIS, combined with tools like OpenSSL, keep your users secure online. But to use these tools correctly, and to avoid mistakes of the past, you must understand how cryptography works. Learn the math behind encryption and digital signatures. Study examples of how it has been misused, and explore the possibilities that cryptography enables in digital currency and collaboration.
-
+
Course Syllabus
History of Cryptography- 36m 20s
—Introduction 2m 13s
—One-Time Pads 3m 8s
—Entropy 4m 42s
—The Enigma Machine 3m 42s
—Cryptanalysis 5m 42s
—Diffie-Hellman 9m 17s
—Diffie-Hellman Example 5m 44s
—Conclusion 1m 48sAlgorithms- 53m 14s
—Introduction 0m 35s
—Block Ciphers 2m 9s
—Confusion and Key Schedules 1m 13s
—Diffusion and Cipher Block Chaining 1m 44s
—Initialization Vectors 1m 2s
—DES 1m 11s
—AES 2m 36s
—Modern Cryptanalysis 2m 7s
—Compression and Error Correction 3m 58s
—Public and Private Keys 2m 59s
—Inverse Exponents Example 2m 27s
—Finding Inverse Exponents 4m 45s
—The RSA Algorithm 2m 21s
—Patterns in RSA 2m 32s
—Discrete Logarithm Problem 5m 32s
—Elliptic Curve 3m 23s
—Digital Signatures 2m 30s
—Hashing Algorithms 2m 21s
—Birthday Attack 4m 4s
—Trust 2m 19s
—Summary 1m 18sAPIs- 36m 25sTransport Layer Security- 22m 8sAuthentication and Authorization- 40m 1sCase Studies- 28m 56sDecentralized Systems- 37m 28s