Cryptography Beginners Guide with openSSL
What you'll learn
- fully Understand the concepts of encryption algorithm's, hands on. create symmetric and asymmetric keys, generate certificates, apply hash functions
- Motivation, Curios about Encryption and Cryptography , Comfortable using the command line interface (optional)
OpenSSL and Cryptography - Beginners Guide
A complete Guide
That will walk you through the secrets of:
Encryption, symmetric keys, ciphers, digital signatures using openSSL
What students wrote
"Great teacher, alive, and communicative."
"Ofer is so knowledgeable and experienced. I really enjoyed learning from him."
"Awesome course! The instructor really goes indepth on every concept!"
"I absolutely loved this course. It taught me everything I needed know about cryptography."
Thanks for a great and easy to understand course ofer.
I've not done much in the way of cryptography for many years because of the jobs that I've held not requiring it. I've begun exploring and revisiting some things to freshen up my experience and understanding. This was a great way to revisit with good detailed explanations in the step by step clips that were offered. Great for beginners or just an overall refresher.
This course is Hands On. I will teach you the theory and the practical usage.
You will understand how HTTPS works with public key cryptography and how to use Hash functions to keep your files integrity safe
WHY openSSL cryptography ?
Cryptography is everywhere, if you are an ethical hacker, Developer, an IT manager or anyone who hangs around with technology, than this is the stuff that you deal with everyday
In this course you will learn to generate symmetric keys , public keys, certificate request, hash functions and more
You will understand the theoretical concepts of encryption using public and private keys , and use the power of openSSL to apply them
This course is HANDS ON . no power points or fancy words .
WHAT WILL YOU LEARN
how encryption works
when do we use encryption
cipher algorithm operations
what are symmetric keys
generate and apply symmetric keys on openSSL
when do we use hash functions for integrity and when for confidentiality
hash different files on your computers
public key cryptography
the theory beyond public and private key
create your own certificate signing request
crate your own self sign request
Students who have little or no experience in cryptography, and are curious to finally understand the mysterious concepts
Anyone who is interested in encryption and hashing techniques , wants to understand and learn how to apply them
Ethical hackers, web developers and developers who wants to extend their knowledge on cryptography
Who this course is for:
- Any one who is interested to learn how encryption works, what are certificates, digital signatures, symmetric and public keys and apply their knowledge in a Practical openSSL Guide
I have 15 years of experience in Network security and Wi-Fi deployments. i have worked as a director of products, innovation and development in telecom companies ( orange IL ) and VP product for professional services companies.
I have a Ruckus Wi-Fi WISE certification , a Cisco CCNA R&S certification and a NSE4 Fortinet certification
Wi-fi and security are a true passion of mine, it is making a difference in people's life everywhere . in IOT, Location based apps, Retail, Automation and more.
I built this course, for people like you, who are always looking and, Passionate to understand the key technologies used today.