Security+ Certification - Cryptography Domain
4.0 (5 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
537 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Security+ Certification - Cryptography Domain to your Wishlist.

Add to Wishlist

Security+ Certification - Cryptography Domain

Pass the Cryptography Domain section of the Security+ exam and become a part of the growing Cyber Security industry.
4.0 (5 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
537 students enrolled
Created by Chad Russell
Last updated 2/2017
English
English [Auto-generated]
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Pass the Cryptography Domain section of the Security+ exam and become a part of the growing Cyber Security industry.
  • Speak intelligently about encryption concepts and understand crypto terminology.
View Curriculum
Requirements
  • Internet connection.
  • Active Udemy account.
Description

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! 

The Security+ exam covers six domains and this course focuses on the sixth domain which is 'Cryptography'.   

  • You will learn about public and private key encryption
  • Message Authentication Codes
  • Public Key Infrastructure
  • Public Key Infrastructure Management
  • Basic Cryptography
  • Advanced Cryptography

There are two types of encryption we will discuss in detail are symmetric and asymmetric .   

Next  you will cover some of the finer points of the subject such as Cipher types and specific Cipher attacks. You will learn  how Message Authentication Codes are used and their role in securing network communications.  This  includes hashing algorithms used and resisting MAC attacks. 

We will cover specific cryptographic algorithms such as those used in elliptic curve cryptography and quantum crypto.  Hashes are great for providing fingerprints of blocks of data such as passwords but given enough time and resources they can be cracked.   You will learn how to enhance hashes, with just a pinch of salt.

In the lesson on Public Key Cryptography and Public Key Infrastructure you will learn about:

  • Public/Private Keys
  • Message Digests
  • Digital Signatures 
  • Chains of trust and Certificate Authorities

In this section on PKI Management we will cover the various management tasks involved with creating and managing a PKI infrastructure and how to generate signed certificates using OpenSSL. 


Who is the target audience?
  • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!
  • Anyone interested in understanding cryptography.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
12 Lectures
01:43:45
+
Core Cryptography
3 Lectures 25:21

There are two types of encryption we will discuss in detail are symmetric and asymmetric .   Asymmetric encryption public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in the pair can be shared with everyone; it is called the public key.  The other key in the pair is kept secret; it is called the private key. 

Preview 07:51

We’ve covered the fundamentals of basic Symmetric Key and Public Key encryption in prior lessons.   Here we will cover some of the finer points of the subject such as Cipher types and specific Cipher attacks. 

Advanced Crypto Concepts
14:18
+
Crypto Algorithms
5 Lectures 35:40
Message Authentication Codes
06:18

Cryptographic Algorithms
08:35


Hashes and Salting
07:35

Hands-On Wireless Encryption Architecture
07:39
+
Public Key Cryptography in Practice
4 Lectures 42:44
Public Key Infrastructure
09:14

PKI Management
20:55

Hands-On Securing E-Mail Using PKI Encryption
11:05

Course Summary
01:30
About the Instructor
Chad Russell
3.8 Average rating
1,122 Reviews
22,871 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!