File Encryption Basics and Practices with CrococryptFile

Learn how to use CrococryptFile, learn what file encryption means on the technical level.
4.4 (115 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
3,809 students enrolled
Free
Start Learning Now
  • Lectures 6
  • Length 43 mins
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2016 English

Course Description

In this course, you will learn how to use CrococryptFile, the open-source file encryption solution. Learn what encryption means on the technical level – as a background information to choose the right file encryption method for your case. If you care about privacy and if you are willing to do something about it, you are already on the right track. This applies for enterprise and private users alike.

First, you will get an introduction on encryption in general to understand the characteristics of the different existing technologies. Then, we will go through the application family step-by-step: Windows, Linux, Web-based and Command-line interface.

IT background would be a plus but is not required to take this course.

What are the requirements?

  • Everything is covered in the course.

What am I going to get from this course?

  • Choose appropriate encryption methods for sensitive data files
  • Challenge security claims about encryption
  • Deploy CrococryptFile in a SMB enterprise environment

What is the target audience?

  • This course is meant for everyone with an interest in data privacy and especially in privacy for data files. This applies for offline and online security of files, e.g., encrypting files appropriately on your local computer, your company laptop, for your cloud storage or for file interchange. Basic IT and crypto knowledge is a plus but not required.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction and Basics
17:04

This lecture gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level.

Section 2: CrococryptFile in Practice
02:07

This lecture contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components.

04:10

This lecture demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family.

04:10
This lecture demonstrates how to use tokens to encrypt file archives with CrococryptFile.
09:53

This lecture explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile.

05:35
This lecture demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Dipl.-Inform. Frank Hissen, Computer Scientist / IT security expert

Frank Hissen successfully studied Computer Science at Darmstadt University of Technology (Germany) focusing on IT security. For over 15 years, he works as IT consultant and software engineer; for over 10 years, he also works in various positions as security expert in IT development and consulting projects. He mainly worked for large businesses but also medium-sized companies.

He develops software and system architectures for complex systems and implements them or supervises the implementation. Moreover, he creates studies and function specifications.

In the area of IT security, Mr. Hissen is specialized in applied and technical IT security. For major as well as smaller companies, he equally developed and implemented security solutions and accompanied processes for secure product and software development.

In the area of cryptography and encryption, Mr. Hissen developed security solutions as Senior Solution Engineer at SECUDE before he became self-employed in 2009. Since then he works as freelancing expert in the area of web and cloud application security. He creates secure conceptual designs of system architectures but also takes care of their secure implementation and corresponding security requirements. One other focus is the technical examination and validation of the actual implementation.

Until now, Mr. Hissen worked in various projects amongst others for Deutsche Telekom AG, SECUDE, Allianz AG, ITO Darmstadt UT and SAP Research.

Ready to start learning?
Start Learning Now