Secure Programmer: Encryption

Intermediate
  • 5 videos | 21m 10s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 62 users Rating 4.5 of 62 users (62)
In this 5-video course, learners discover the basics of cryptographic algorithms. You will receive a general overview of symmetric algorithms such as AES, Blowfish, and Serpent. You will also examine asymmetric algorithms such as RSA (Rivest, Sharmir, and Adelman), Diffie-Hellman, and elliptic-curve cryptography (ECC). More importantly, you will learn when to use which algorithm and what algorithms are better for specific purposes. You will then move on to integrity algorithms, including hashes like SHA (Secure Hash Algorithm 1), MD5 (Message Digest 5), and 6, RIPEMD (Ripe Message Digest), and HAVAL, as well as message authentication codes (MACs) and HMACs (keyed-hash message authentication codes). You will also examine the strengths and weaknesses of these different approaches. The goal is whether one can make intelligent choices about which algorithms to implement for which purpose; whether one's concerns are about confidentiality; if one needs to do key exchange; is message integrity an issue; are you storing passwords? These will each require different algorithms.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe symmetric algorithms including aes, blowfish, and serpent
    Describe asymmetric algorithms including rsa, ecc, and diffie-helman
  • Describe hashing algorithms such as md5 and sha as well as mac and hmac
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 45s
  • 6m 11s
    After completing this video, you will be able to describe symmetric algorithms, including AES, Blowfish, and Serpent. FREE ACCESS
  • Locked
    3.  Asymmetric Encryption Algorithms
    5m 32s
    Upon completion of this video, you will be able to describe asymmetric algorithms, including RSA, ECC, and Diffie-Helman. FREE ACCESS
  • Locked
    4.  Cryptographic Hash Encryption Algorithms
    6m 11s
    After completing this video, you will be able to describe hashing algorithms such as MD5, SHA, MAC, and HMAC. FREE ACCESS
  • Locked
    5.  Course Summary
    1m 32s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 239 users Rating 4.6 of 239 users (239)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.9 of 22 users Rating 4.9 of 22 users (22)
Rating 4.5 of 92 users Rating 4.5 of 92 users (92)
Rating 4.1 of 60 users Rating 4.1 of 60 users (60)