From the course: Learning Cryptography and Network Security
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Next steps
- [Instructor] Thank you for watching. In this course, we took a look at the various cryptographic and hashing techniques that are used to secure data. We reviewed some of the historical uses of encryption along with the ways we can provide confidentiality, integrity, authentication and accountability. We then learned about the main classes of encryption such as symmetric and asymmetric encryption along with commonly used algorithms. I then outlined hashing, message digests and passwords and saw some real-time applications of cryptographic techniques to secure our documents, email and online transactions. If you're interested in learning more, please check out the library where new courses are added all the time. You might want to check out securing the internet of things, privacy. If you're interested in learning more about security basics, check out my foundations of IT security series. If you're interested in learning…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.