Cryptographic Methods
Beginner
- 8 videos | 27m 17s
- Includes Assessment
- Earns a Badge
Cryptography uses different methods to protect data. Explore different methods used to protect or transmit data securely, and some of the components that ensure data can be protected.
WHAT YOU WILL LEARN
-
Describe how opt, or one-time pad, cryptography can theoretically provide perfect secrecy but has some significant limitationsDescribe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphersDescribe and identify the features and use cases for symmetric-key cipher algorithmsDescribe and identify the features and use cases for asymmetric-key cipher algorithms
-
Describe the use of steganography in encryption products to hide the fact data is even encryptedDescribe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrityDescribe a digital signature and how it can be used for authentication and non-repudiationIdentify the cryptographic algorithm to use
IN THIS COURSE
-
3m 47sUpon completion of this video, you will be able to describe how OPT, or one-time pad, cryptography can theoretically provide perfect secrecy, but has some significant limitations. FREE ACCESS
-
4m 8sUpon completion of this video, you will be able to describe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphers. FREE ACCESS
-
2m 34sUpon completion of this video, you will be able to describe and identify the features and use cases for symmetric key cipher algorithms. FREE ACCESS
-
3m 24sUpon completion of this video, you will be able to describe and identify the features and use cases for asymmetric key cipher algorithms. FREE ACCESS
-
4m 20sUpon completion of this video, you will be able to describe the use of steganography in encryption products to hide the fact that data is even encrypted. FREE ACCESS
-
2m 58sAfter completing this video, you will be able to describe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrity. FREE ACCESS
-
2m 50sUpon completion of this video, you will be able to describe a digital signature and how it can be used for authentication and to prevent denial. FREE ACCESS
-
3m 17sDuring this video, you will learn how to identify the appropriate cryptographic algorithm to use. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.