From the course: Learning Cryptography and Network Security

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Next steps

Next steps

From the course: Learning Cryptography and Network Security

Start my 1-month free trial

Next steps

- [Instructor] Thank you for watching. In this course, we took a look at the various cryptographic and hashing techniques that are used to secure data. We reviewed some of the historical uses of encryption along with the ways we can provide confidentiality, integrity, authentication and accountability. We then learned about the main classes of encryption such as symmetric and asymmetric encryption along with commonly used algorithms. I then outlined hashing, message digests and passwords and saw some real-time applications of cryptographic techniques to secure our documents, email and online transactions. If you're interested in learning more, please check out the library where new courses are added all the time. You might want to check out securing the internet of things, privacy. If you're interested in learning more about security basics, check out my foundations of IT security series. If you're interested in learning…

Contents