Advanced Cryptography: Application and Data Security
- 2.8
Brief Introduction
One stop Guide to get the Hands-On Experience of Tools, Techniques and Methodologies of CryptographyDescription
Cryptography is on of the foundation pillars of the Security. In this course, We are going to do lot of Hands-On to learn how to practically implement all the famous Techniques and Methodologies of Cryptography.
We have included :
Encryption, Hashing, Encoding, Obfuscation ,
Cryptosystems which includes:-
Symmetric & Asymmetric Key Cryptography,
MD5,
SHA,
HMAC,
Cryptographic Protocols like SSL, PGP and
Digital Signatures
Cryptographic Attacks which includes:-
Brute Force Attack,
Dictionary Attack,
Rainbow Table Attack,
Collision Attack, and
Pre-image Attack
Cryptographic Tools which includes:-
Encryption - Bitlocker, DiskCryptor, LUKS
HashingHash - Calculator, FTK, SIFT
File Shredders - Eraser, AVG Shredder, CCleaner,
Steganography - Steg, Our Secret, OpenPuff
Requirements
- Requirements
- Learners with basic understanding of Math and Computers can do this course. This course is designed to take Learners from Very Basic Knowledge Level to the Aadvance Level.