Introduction to Encryption - Terminology and Technology

Understand the terms and expressions of encryption technologies and learn to apply encryption properly
4.2 (17 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
371 students enrolled
$19
$20
5% off
Take This Course
  • Lectures 12
  • Length 38 mins
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 3/2016 English

Course Description

AES-128, Public Key, Certificates? What do symmetric and asymmetric encryption actually mean? Where are these used? This course provides a basic introduction to the field of encryption.

The course explains the common terminology but also the technical background. This course is right for everybody who wants to understand what encryption means in practice and what to watch out for. Smattering knowledge can be challenged, practical insights will be provided.

If you care about data security and privacy – likewise on the enterprise level and in private life – you are already on the right track. This course can deepen your knowledge and turn your focus where to look at.

General background knowledge in IT is an advantage but not required.

What are the requirements?

  • A basic interest in the fields of data security, privacy and technology

What am I going to get from this course?

  • Understand technical terms and current technologies
  • Evaluate what encryption means and provides
  • Make technology choices with practice-orientation

What is the target audience?

  • This course is right for anyone who cares about data security and privacy – likewise on the enterprise level and in private life. The course improves your knowledge and provides practical insights.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
01:13

Course and chapter overview

04:17

Why should we bother encrypting our data.

02:50

In simple words, what is encryption basically.

Section 2: Basics of common Encryption Technologies
Basics: Symmetric and asymmetric Encryption
03:39
Hybrid Encryption
03:26
Password-based Encryption
Preview
01:00
Section 3: Technical Aspects of Encryption
Algorithms
01:46
Public Key Technology
2 questions
Symmetric Encryption
1 question
Technical Parameters for Encryption I
07:24
Technical Parameters for Encryption II
03:07
Cryptographic Key Formats
01:22
Section 4: File and System encryption
File and System encryption
06:43
Section 5: Conclusion
Conclusion
Preview
01:19

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Dipl.-Inform. Frank Hissen, Computer Scientist / IT security expert

Frank Hissen successfully studied Computer Science at Darmstadt University of Technology (Germany) focusing on IT security. For over 15 years, he works as IT consultant and software engineer; for over 10 years, he also works in various positions as security expert in IT development and consulting projects. He mainly worked for large businesses but also medium-sized companies.

He develops software and system architectures for complex systems and implements them or supervises the implementation. Moreover, he creates studies and function specifications.

In the area of IT security, Mr. Hissen is specialized in applied and technical IT security. For major as well as smaller companies, he equally developed and implemented security solutions and accompanied processes for secure product and software development.

In the area of cryptography and encryption, Mr. Hissen developed security solutions as Senior Solution Engineer at SECUDE before he became self-employed in 2009. Since then he works as freelancing expert in the area of web and cloud application security. He creates secure conceptual designs of system architectures but also takes care of their secure implementation and corresponding security requirements. One other focus is the technical examination and validation of the actual implementation.

Until now, Mr. Hissen worked in various projects amongst others for Deutsche Telekom AG, SECUDE, Allianz AG, ITO Darmstadt UT and SAP Research.

Ready to start learning?
Take This Course