File Encryption Basics and Practices with CrococryptFile

Learn how to use CrococryptFile, learn what file encryption means on the technical level.
Rating: 4.3 out of 5 (341 ratings)
11,574 students
File Encryption Basics and Practices with CrococryptFile
Rating: 4.3 out of 5 (341 ratings)
11,574 students
Choose appropriate encryption methods for sensitive data files
Challenge security claims about encryption
Deploy CrococryptFile in a SMB enterprise environment

Requirements

  • Everything is covered in the course.
Description

In this course, you will learn how to use CrococryptFile, the open-source file encryption solution. Learn what encryption means on the technical level – as a background information to choose the right file encryption method for your case. If you care about privacy and if you are willing to do something about it, you are already on the right track. This applies for enterprise and private users alike.

First, you will get an introduction on encryption in general to understand the characteristics of the different existing technologies. Then, we will go through the application family step-by-step: Windows, Linux, Web-based and Command-line interface.

IT background would be a plus but is not required to take this course.

THIS IS A FOREVER FREE COURSE to support the open-source encryption solution CrococryptFile!

Who this course is for:
  • This course is meant for everyone with an interest in data privacy and especially in privacy for data files. This applies for offline and online security of files, e.g., encrypting files appropriately on your local computer, your company laptop, for your cloud storage or for file interchange. Basic IT and crypto knowledge is a plus but not required.
Course content
2 sections • 6 lectures • 42m total length
  • Introduction to Encryption and File-encryption
    17:04
  • CrococryptFile Windows Installation
    02:07
  • Password-based Encryption, Decryption and WebDecrypt
    04:10
  • Token-based Encryption with Windows Keystore and OpenPGP
    04:10
  • Forensics on Headerless encrypted Files
    09:53
  • Linux, Unix and Command-line usage
    05:35

Instructor
Computer Scientist / IT security expert
Frank Hissen
  • 4.2 Instructor Rating
  • 701 Reviews
  • 14,450 Students
  • 4 Courses

Frank Hissen successfully studied Computer Science at Darmstadt  University of Technology (Germany) focusing on IT security. For over 15  years, he works as IT consultant and software engineer; for over 10  years, he also works in various positions as security expert in IT  development and consulting projects. He mainly worked for large businesses but also medium-sized companies.

He develops software and system architectures for complex systems and  implements them or supervises the implementation. Moreover, he creates  studies and function specifications.

In the area of IT security, Mr. Hissen is specialized in applied and  technical IT security. For major as well as smaller companies, he  equally developed and implemented security solutions and accompanied  processes for secure product and software development.

In the area of cryptography and encryption, Mr. Hissen developed  security solutions as Senior Solution Engineer at SECUDE before he  became self-employed in 2009. Since then he works as freelancing expert  in the area of web and cloud application security. He creates secure conceptual designs of system architectures but also  takes care of their secure implementation and corresponding security  requirements. One other focus is the technical examination and  validation of the actual implementation.

Until now, Mr. Hissen worked in various projects amongst others  for Deutsche Telekom AG, SECUDE, Allianz AG, ITO Darmstadt UT and SAP  Research.