Learning Cryptography and Network Security

Go to class
Write Review

Free Online Course: Learning Cryptography and Network Security provided by LinkedIn Learning is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Learning Cryptography and Network Security is taught by Lisa Bock.

Overview
  • Understand the basics of cryptography to keep your networks, systems, and data secure.

Syllabus
  • Introduction

    • Keeping information safe
    • What you need to know
    1. Safeguarding the Network
    • Providing security services
    • Compare network attacks
    • Introduce cryptographic terminology
    • Review the history of cryptography
    • Challenge: Coding with the Enigma
    • Solution: Coding with the Enigma
    2. Dissecting Symmetric Encryption
    • Introducing symmetric encryption
    • Developing DES
    • Work with AES
    • Compare block and stream ciphers
    • Understand modes of operation
    • Secure wireless communication
    • Challenge: Encrypt data with AES
    • Solution: Encrypt data with AES
    3. Exploring Asymmetric Encryption
    • Grasping public key cryptography
    • Exchanging keys using asymmetric encryption
    • Using digital signatures
    • Managing keys using PKI
    • Navigating certificates
    4. Reviewing Hash Algorithms
    • Diving into hash algorithms
    • Looking deeper into message digests
    • Understanding passwords
    • Challenge: Password strength tests
    • Solution: Password strength tests
    5. Applying Cryptography
    • Introducing Transport Layer Security
    • Providing email privacy
    • Implementing email security with GPG
    • Examining blockchain technology
    • Safeguarding cryptography
    6. Securing the Internet Protocol
    • Exploring Internet Protocol Security
    • Dissecting the Authentication Header
    • Encapsulating Security Payload
    • Comparing IPsec operating modes
    Conclusion
    • Next steps