Tutorialspoint

April Learning Carnival is here, Use code FEST10 for an extra 10% off

Conversation on Cryptography: w/ Mike Meyers

person icon Total Seminars

3.9

Conversation on Cryptography: w/ Mike Meyers

Diving into cryptography with The Alpha Geek and Total Seminars team. Learn cyber security and ethical hacking.

updated on icon Updated on Apr, 2024

language icon Language - English

person icon Total Seminars

English [CC]

category icon IT & Software,Network & Security

Lectures -11

Duration -2 hours

3.9

price-loader

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

Hey there! Mike Meyers, your favorite nerd, here to present a fun, casual, and informative conversation on cryptography. I partnered with my good friend, Bill Saichek, to talk about one of my very favorite topics: cryptography. I've loved the idea of cryptic codes, secret agents, and deciphering hidden text since I was a kid. And because I've had so many questions on this topic, I decided to try a different kind of course to help my students understand the more complex concepts in cryptography.

This Conversation on Cryptography course was designed with YOU in mind, whether you're just curious about cryptography (like me), or you took my CompTIA Security+ (SY0-501): The Total Course (or any other cyber security course) and would like a better understanding of this intriguing subject. Here's a rundown of what Bill and I talk about:

  • Caesar and Vigenere ciphers - These fascinating ciphers form part of the basic foundation of cryptography, back before the digital age when militaries, powerful leaders, and spies had to pass messages that couldn't be deciphered if they fell into enemy hands.

  • Binary - In order for ciphers to be useful today, cryptographers had to figure out how to translate them into the language of computers (1s and 0s).

  • Hashing - If all our digital data are just strings of 1s and 0s, how can we make sure we have the real deal? Learn about authentication in this episode.

  • Asymmetric cryptography - We discuss how generating a key pair offers more security, though at the price of taking more time.

  • Symmetric cryptography - This quick and dirty cryptosystem uses a single key to both encrypt and decrypt.

  • Asymmetric methods - Dig into how these methods actually work, and how prime numbers are keeping your data safe. Did we mention we play with paint in this episode?

  • Certificates - The Web is full of hackers who want to take advantage of your personal and private information. So, who do we trust? That's where certificates come in.

  • Public key infrastructure - How do we pass out those certificates? And assure the authenticity of them? PKI to the rescue!

  • Living with certificates - We get our hands on some of those certificates and teach you how to troubleshoot them when something goes wrong.

So sit down, grab a cup of coffee, and join Bill & I for a conversation on cryptography.

Who this course is for:

  • Beginner-level Cyber or IT Security Technicians who want to better understand how crucial cryptography is to their job.
  • Students of any network security course (including my CompTIA Security+ (SY0-501): The Total Course) who would like to get a better grasp on how cryptography is used throughout the Internet.
  • PC and Network technicians looking to expand their understanding of cryptography in IT security.
  • Anyone curious about cryptography in technology, and how we keep our data safe from hackers as it travels across networks.

Goals

What will you learn in this course:

  • Define cryptography and the key role it plays in protecting our digital data.
  • Learn how hashing helps us to be certain the data we receive or download is legitimate.
  • Find out how Web sites use certificates to make sure our usernames, passwords, credit card numbers, and other personal data stay secure.
  • Prepare for the CompTIA Security+ exam by better understanding cryptography and PKI, one of the six exam domains.
  • Understand ciphers, binary, hashing, symmetric and asymmetric cryptosystems, digital signatures and certificates, and public key infrastructure.

Prerequisites

What are the prerequisites for this course?

  • Basic familiarity with PCs and networks.
  • A curiosity about cryptography, the science of encryption and decryption, and how it keeps our data safe across networks.
  • There are no specific prerequisites, since the course covers the topic in detail.
Conversation on Cryptography: w/ Mike Meyers

Curriculum

Check out the detailed breakdown of what’s inside the course

Cryptography
10 Lectures
  • play icon Why Cryptography? 05:26 05:26
  • play icon Caesar Cipher 05:48 05:48
  • play icon Vigenere Cipher 11:12 11:12
  • play icon Moving to Binary 29:34 29:34
  • play icon Hashing 20:17 20:17
  • play icon Asymmetric Cryptography 11:33 11:33
  • play icon Asymmetric Methods 11:16 11:16
  • play icon Certificates 10:45 10:45
  • play icon Public Key Infrastructure (PKI) 14:56 14:56
  • play icon Living with Certificates 22:01 22:01

Instructor Details

Total Seminars

Total Seminars

e


Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515