Rating 0 out of 5 (0 ratings in Udemy)
What you'll learn- What is Cryptography and science behind it
- What are the origins of Cryptography and how it evolved with time
- Understand the core concepts like Traditional ciphers vs Modern Ciphers, Hashing vs Encryption, Symmetric Key Cryptography, Asymmetric Key Cryptography, Digital Signatures, Certificates and PKI
- What are the various algorithms behind hashing and encryption like SHA-256, AES, DES, RSA
- Understand how Cryptography plays a key …
Rating 0 out of 5 (0 ratings in Udemy)
What you'll learn- What is Cryptography and science behind it
- What are the origins of Cryptography and how it evolved with time
- Understand the core concepts like Traditional ciphers vs Modern Ciphers, Hashing vs Encryption, Symmetric Key Cryptography, Asymmetric Key Cryptography, Digital Signatures, Certificates and PKI
- What are the various algorithms behind hashing and encryption like SHA-256, AES, DES, RSA
- Understand how Cryptography plays a key role in today's world to protect our digital world
- Understand various Cryptography attacks and their types like Brute Force Attack (BFA), Man In Middle Attack (MIM), Power Analysis Attacks, Ciphertext Only Attacks, Birthday Attacks etc.
- Cryptography benefits and its drawbacks
DescriptionThis course is for anyone with interest towards learning cryptography! There are no prerequisites
This course is designed in two parts. This course is part-1. The complete course would cover the following
What is Cryptography and science behind it
What are the origins of Cryptography and how it evolved with time
Understand the core concepts like Traditional ciphers vs Modern Ciphers, Hashing vs Encryption, Symmetric Key Cryptography, Asymmetric Key Cryptography, Digital Signatures, Certificates and PKI
What are the various algorithms behind hashing and encryption like SHA-256, AES, DES, RSA
Understand how Cryptography plays a key role in today's world to protect our digital world
Understand various Cryptography attacks and their types like Brute Force Attack (BFA), Man In Middle Attack (MIM), Power Analysis Attacks, Ciphertext Only Attacks, Birthday Attacks etc.
Cryptography benefits and its drawbacks