Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add Introduction to Encryption - Terminology and Technology to your Wishlist.

Add to Wishlist

Introduction to Encryption - Terminology and Technology

Understand the terms and expressions of encryption technologies and learn to apply encryption properly
4.2 (17 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
380 students enrolled
Last updated 3/2016
$10 $20 50% off
3 days left at this price!
30-Day Money-Back Guarantee
  • 38 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?

AES-128, Public Key, Certificates? What do symmetric and asymmetric encryption actually mean? Where are these used? This course provides a basic introduction to the field of encryption.

The course explains the common terminology but also the technical background. This course is right for everybody who wants to understand what encryption means in practice and what to watch out for. Smattering knowledge can be challenged, practical insights will be provided.

If you care about data security and privacy – likewise on the enterprise level and in private life – you are already on the right track. This course can deepen your knowledge and turn your focus where to look at.

General background knowledge in IT is an advantage but not required.

Who is the target audience?
  • This course is right for anyone who cares about data security and privacy – likewise on the enterprise level and in private life. The course improves your knowledge and provides practical insights.
Students Who Viewed This Course Also Viewed
What Will I Learn?
Understand technical terms and current technologies
Evaluate what encryption means and provides
Make technology choices with practice-orientation
View Curriculum
  • A basic interest in the fields of data security, privacy and technology
Curriculum For This Course
Expand All 12 Lectures Collapse All 12 Lectures 38:06
3 Lectures 08:20

Course and chapter overview

Preview 01:13

Why should we bother encrypting our data.

Preview 04:17

In simple words, what is encryption basically.

Preview 02:50
Basics of common Encryption Technologies
3 Lectures 08:05
Basics: Symmetric and asymmetric Encryption

Hybrid Encryption

Technical Aspects of Encryption
4 Lectures 13:39

Public Key Technology
2 questions

Symmetric Encryption
1 question

Technical Parameters for Encryption I

Technical Parameters for Encryption II

Cryptographic Key Formats
File and System encryption
1 Lecture 06:43
File and System encryption
1 Lecture 01:19
About the Instructor
4.3 Average rating
300 Reviews
6,089 Students
4 Courses
Computer Scientist / IT security expert

Frank Hissen successfully studied Computer Science at Darmstadt University of Technology (Germany) focusing on IT security. For over 15 years, he works as IT consultant and software engineer; for over 10 years, he also works in various positions as security expert in IT development and consulting projects. He mainly worked for large businesses but also medium-sized companies.

He develops software and system architectures for complex systems and implements them or supervises the implementation. Moreover, he creates studies and function specifications.

In the area of IT security, Mr. Hissen is specialized in applied and technical IT security. For major as well as smaller companies, he equally developed and implemented security solutions and accompanied processes for secure product and software development.

In the area of cryptography and encryption, Mr. Hissen developed security solutions as Senior Solution Engineer at SECUDE before he became self-employed in 2009. Since then he works as freelancing expert in the area of web and cloud application security. He creates secure conceptual designs of system architectures but also takes care of their secure implementation and corresponding security requirements. One other focus is the technical examination and validation of the actual implementation.

Until now, Mr. Hissen worked in various projects amongst others for Deutsche Telekom AG, SECUDE, Allianz AG, ITO Darmstadt UT and SAP Research.

Report Abuse