Introduction to Applied Cryptography and Cryptanalysis
Rated 3.5/5 based on 11 customer reviews

Introduction to Applied Cryptography and Cryptanalysis

Available: Out of Stock
$0.00

Request Info
This skill path introduces cryptography, its applications, and methods for decrypting and deobfuscating data. The fundamentals of cryptography are introduced as well as common applications of cryptography. The path also introduces weak algorithms used by malware, how to identify them and methods for deobfuscating data.

Skill Assessment

Skill assessment | 20 questions

See how your applied cryptography and cryptanalysis skills stack up against other professionals in your field.

Cybersecurity Data Science Project

Project | 2 hours 10 minutes

Practice your cryptography skills by solving challenges..

Introduction to Cryptography

Course | 25 minutes

This course defines the basic vocabulary and concepts of cryptography.

Fundamentals of Cryptography

Course | 20 minutes

This course describes mathematics and structures commonly used in cryptography

Symmetric Cryptography

Course | 45 minutes

This course provides an introduction to symmetric encryption algorithms.

Asymmetric Cryptography

Course | 36 minutes

This course provides an introduction to asymmetric encryption algorithms.

Hash Functions

Course | 17 minutes

This course provides an introduction to hash functions.

Public Key Infrastructure (PKI)

Course | 18 minutes

This course describes the use of cryptography in the PKI infrastructure.

SSL and TLS

Course | 26 minutes

This course describes the use of cryptography in SSL and TLS.

Virtual Private Networks (VPNs)

Course | 18 minutes

This course describes the use of cryptography in Virtual Private Networks (VPNs).

Secure Credential Management

Course | 26 minutes

This course describes the use of cryptography in securely managing user credentials.

Full Disk Encryption

Course | 10 minutes

This course describes the use of cryptography in full disk encryption

Blockchain Technology

Course | 25 minutes

This course describes the use of cryptography in blockchain technology

Introduction to Cryptanalysis

Course | 36 minutes

This course introduces you to the field of cryptanalysis.

Applied Cryptanalysis

Course | 25 minutes

This course provides demonstrations of using cryptanalysis for incident response.

This skill path introduces cryptography, its applications, and methods for decrypting and deobfuscating data. The fundamentals of cryptography are introduced as well as common applications of cryptography. The path also introduces weak algorithms used by malware, how to identify them and methods for deobfuscating data.

Skill Assessment

Skill assessment | 20 questions

See how your applied cryptography and cryptanalysis skills stack up against other professionals in your field.

Cybersecurity Data Science Project

Project | 2 hours 10 minutes

Practice your cryptography skills by solving challenges..

Introduction to Cryptography

Course | 25 minutes

This course defines the basic vocabulary and concepts of cryptography.

Fundamentals of Cryptography

Course | 20 minutes

This course describes mathematics and structures commonly used in cryptography

Symmetric Cryptography

Course | 45 minutes

This course provides an introduction to symmetric encryption algorithms.

Asymmetric Cryptography

Course | 36 minutes

This course provides an introduction to asymmetric encryption algorithms.

Hash Functions

Course | 17 minutes

This course provides an introduction to hash functions.

Public Key Infrastructure (PKI)

Course | 18 minutes

This course describes the use of cryptography in the PKI infrastructure.

SSL and TLS

Course | 26 minutes

This course describes the use of cryptography in SSL and TLS.

Virtual Private Networks (VPNs)

Course | 18 minutes

This course describes the use of cryptography in Virtual Private Networks (VPNs).

Secure Credential Management

Course | 26 minutes

This course describes the use of cryptography in securely managing user credentials.

Full Disk Encryption

Course | 10 minutes

This course describes the use of cryptography in full disk encryption

Blockchain Technology

Course | 25 minutes

This course describes the use of cryptography in blockchain technology

Introduction to Cryptanalysis

Course | 36 minutes

This course introduces you to the field of cryptanalysis.

Applied Cryptanalysis

Course | 25 minutes

This course provides demonstrations of using cryptanalysis for incident response.