File Encryption Basics and Practices with CrococryptFile
4.2 (149 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
4,988 students enrolled
Wishlisted Wishlist

Please confirm that you want to add File Encryption Basics and Practices with CrococryptFile to your Wishlist.

Add to Wishlist

File Encryption Basics and Practices with CrococryptFile

Learn how to use CrococryptFile, learn what file encryption means on the technical level.
4.2 (149 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
4,988 students enrolled
Last updated 1/2016
English
Price: Free
Includes:
  • 43 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Choose appropriate encryption methods for sensitive data files
  • Challenge security claims about encryption
  • Deploy CrococryptFile in a SMB enterprise environment
View Curriculum
Requirements
  • Everything is covered in the course.
Description

In this course, you will learn how to use CrococryptFile, the open-source file encryption solution. Learn what encryption means on the technical level – as a background information to choose the right file encryption method for your case. If you care about privacy and if you are willing to do something about it, you are already on the right track. This applies for enterprise and private users alike.

First, you will get an introduction on encryption in general to understand the characteristics of the different existing technologies. Then, we will go through the application family step-by-step: Windows, Linux, Web-based and Command-line interface.

IT background would be a plus but is not required to take this course.

Who is the target audience?
  • This course is meant for everyone with an interest in data privacy and especially in privacy for data files. This applies for offline and online security of files, e.g., encrypting files appropriately on your local computer, your company laptop, for your cloud storage or for file interchange. Basic IT and crypto knowledge is a plus but not required.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 6 Lectures Collapse All 6 Lectures 42:59
+
Introduction and Basics
1 Lecture 17:04

This lecture gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level.

Introduction to Encryption and File-encryption
17:04
+
CrococryptFile in Practice
5 Lectures 25:55

This lecture contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components.

CrococryptFile Windows Installation
02:07

This lecture demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family.

Password-based Encryption, Decryption and WebDecrypt
04:10

This lecture demonstrates how to use tokens to encrypt file archives with CrococryptFile.
Token-based Encryption with Windows Keystore and OpenPGP
04:10

This lecture explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile.

Forensics on Headerless encrypted Files
09:53

This lecture demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes.
Linux, Unix and Command-line usage
05:35
About the Instructor
Dipl.-Inform. Frank Hissen
4.2 Average rating
344 Reviews
6,790 Students
4 Courses
Computer Scientist / IT security expert

Frank Hissen successfully studied Computer Science at Darmstadt University of Technology (Germany) focusing on IT security. For over 15 years, he works as IT consultant and software engineer; for over 10 years, he also works in various positions as security expert in IT development and consulting projects. He mainly worked for large businesses but also medium-sized companies.

He develops software and system architectures for complex systems and implements them or supervises the implementation. Moreover, he creates studies and function specifications.

In the area of IT security, Mr. Hissen is specialized in applied and technical IT security. For major as well as smaller companies, he equally developed and implemented security solutions and accompanied processes for secure product and software development.

In the area of cryptography and encryption, Mr. Hissen developed security solutions as Senior Solution Engineer at SECUDE before he became self-employed in 2009. Since then he works as freelancing expert in the area of web and cloud application security. He creates secure conceptual designs of system architectures but also takes care of their secure implementation and corresponding security requirements. One other focus is the technical examination and validation of the actual implementation.

Until now, Mr. Hissen worked in various projects amongst others for Deutsche Telekom AG, SECUDE, Allianz AG, ITO Darmstadt UT and SAP Research.