Cryptography: Data and Application Security
4.2 (59 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
547 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Cryptography: Data and Application Security to your Wishlist.

Add to Wishlist

Cryptography: Data and Application Security

A Reference to Cryptography including AES, 3-DES and SHA, SSL and TLS. Ideal for Students, Developers and Professionals
4.2 (59 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
547 students enrolled
Created by Kratikal Academy
Last updated 12/2016
English
Current price: $10 Original price: $195 Discount: 95% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Design security architecture
  • Implement and deploy encryption schemes like AES, 3 - DES and RSA
  • Implement and Deploy hashing algorithms like MD5, SHA Family, H - MACs
  • Understand and use Digital Signatures
  • Understand the working of SSL and TLS
  • Understand and use PGP protocol
View Curriculum
Requirements
  • Number Systems: Binary, Decimal, Hexadecimal
Description

Cryptography is the most intuitive branch of Computer Science. It forms the backbone of IT security and plays an important role in application developement. This course is a handbook to practical cryptography designed for students, developers and industry professionals.

We will start from scratch for the beginners, steadily moving towards encryption, followed by hashing and digital signatures. 

We have given due attention to the practical applications of each algorithm to give you a wholistic view of the topic. 

We have a dedicated section on designing your security architecture where we will develop security policies and security mechanism for real life applications.

Who is the target audience?
  • Developer
  • Security Testers
  • Database Administrator
  • Students
Compare to Other Cryptography Courses
Curriculum For This Course
34 Lectures
02:02:10
+
Introduction to Course
1 Lecture 02:17

This video discusses the overview of the course, its content, the target audience and the approach. 

Preview 02:17
+
Basics of Cryptography
4 Lectures 15:49

Here we discuss why do we use cryptography and which cryptosystem is better for which application


Preview 03:34

Types of attacks
04:18

Secure information transfer
02:47
+
QUIZ
0 Lectures 00:00

This quiz is designed to check your understanding of this section. 

Quiz
5 questions
+
Types of Cryptosystems
4 Lectures 13:31

What is Encryption ?
04:56

Modern Cryptosystems
01:53

Cost - Benefit Analysis
03:39
+
Encryption Schemes
9 Lectures 39:07
Introduction to Symmetric Encryption
06:37

  1. Introduction
  2. Working
  3. Online Demo
  4. How to Use
  5. Advantages
  6. Disadvantages
Data Encryption Standard: DES Algorithm
08:41

  1. Introduction
  2. Working
  3. Advantages
Triple DES: 3 - DES Algorithm
02:59

Advanced Encryption Standard: AES
02:13

Advanced Encryption Standard: Operations
05:01

Advanced Encryption Standard: Analysis
01:27

Introduction to Asymmetric Encryption
04:31

RSA Algorithm
04:03

RSA Algorithm: Process
03:35
+
Hashing Algorithms
5 Lectures 15:21
Introduction to Hashing
05:55

MD5 Hash
01:55

SHA Hash
02:20

Message Authentication Codes
02:11

Digital Signatures
03:00
+
Cryptographic Protocols
4 Lectures 15:09
Introduction to Cryptographic Protocols
02:29

SSL Protocol Part I
03:55

SSL Protocol Part II
04:00

PGP Protocol
04:45
+
Attacks on Cryptosystems
2 Lectures 07:37
Attacks Part I - Brute Force and Dictionary Attacks
04:25

This lecture covers

  1. Rainbow Table Attacks
  2. Collision Attacks
  3. Pre-image Attack
Attacks Part - II
03:12
+
Cryptographic Tools
5 Lectures 13:19
Encryption Tools
02:25

Hashing Tools
02:54

File Shredding Tools
03:19

Steganography Tools
03:04

Miscellaneous Tools
01:37
About the Instructor
Kratikal Academy
3.9 Average rating
222 Reviews
6,306 Students
4 Courses
Learn To Lead

Started as a venture to handle cyber-crime and cyber-bullying cases prevalent in our society, we have successfully tackled such cases on both National and International levels. We currently serve as Cyber-Space Consultants to clients across the globe namely- China, Dubai, UK, Switzerland etc.

We realised in our work as Cyber-Security Personals that a majority of such incidents a targetted against youngsters of age group 16-21 yrs. Hence in 2013, we diversified and entered the field of empowering young technocrats and students in the art of Ethical Hacking and Cyber Security. Hackethics is an outcome some of the best brains of the industry working together.

In past, Kratikal has got an overwhelming response from prominent institutions like IIT BHU, MNNIT Allahabad, Amity University Jaipur, Ewing Christian College and many schools in Allahabad and Lucknow regions. Team Kratikal had an experience of providing education to more than 1000 participants in and across borders of Allahabad.