Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
In this course, you will learn how to use CrococryptFile, the open-source file encryption solution. Learn what encryption means on the technical level – as a background information to choose the right file encryption method for your case. If you care about privacy and if you are willing to do something about it, you are already on the right track. This applies for enterprise and private users alike.
First, you will get an introduction on encryption in general to understand the characteristics of the different existing technologies. Then, we will go through the application family step-by-step: Windows, Linux, Web-based and Command-line interface.
IT background would be a plus but is not required to take this course.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction and Basics|
This lecture gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level.
|Section 2: CrococryptFile in Practice|
This lecture contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components.
This lecture demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family.
|This lecture demonstrates how to use tokens to encrypt file archives with CrococryptFile.|
This lecture explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile.
|This lecture demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes.|
Frank Hissen successfully studied Computer Science at Darmstadt University of Technology (Germany) focusing on IT security. For over 15 years, he works as IT consultant and software engineer; for over 10 years, he also works in various positions as security expert in IT development and consulting projects. He mainly worked for large businesses but also medium-sized companies.
He develops software and system architectures for complex systems and implements them or supervises the implementation. Moreover, he creates studies and function specifications.
In the area of IT security, Mr. Hissen is specialized in applied and technical IT security. For major as well as smaller companies, he equally developed and implemented security solutions and accompanied processes for secure product and software development.
In the area of cryptography and encryption, Mr. Hissen developed security solutions as Senior Solution Engineer at SECUDE before he became self-employed in 2009. Since then he works as freelancing expert in the area of web and cloud application security. He creates secure conceptual designs of system architectures but also takes care of their secure implementation and corresponding security requirements. One other focus is the technical examination and validation of the actual implementation.
Until now, Mr. Hissen worked in various projects amongst others for Deutsche Telekom AG, SECUDE, Allianz AG, ITO Darmstadt UT and SAP Research.