Foundations of Cryptography by TechKnowSurge
TechKnowSurge (Andrew Grimes)
3:50:52
Description
How Cryptography, Public Key Infrastructure (PKI), and Transport Layer Security (TLS) Keep Our Data and Communications
What You'll Learn?
- Explain the importance of cryptography in keeping our information secure
- Explain ways we use cryptography to keep our information secure
- Define key cybersecurity terms and concepts
- Explain the role of a key and the importance of key length
- Describe hashing and how it’s used
- Explain how salt, pepper, and key-stretching can make storing passwords and other data more secure
- Explain what symmetric encryption is and how it’s used
- Explain what Public-Key cryptography is and how it’s used
- List types of cryptography attacks
- Explain how Public Key Infrastructure (PKI) keeps our data safe
- Describe types of trust models
- Explain key PKI terms
- Describe what a digital certificate is and how it’s used
- Explain the need for revoking certificates and list methods of revoking certificates
- Explain the purpose of Transport Layer Security (TLS)
- Explaining the TLS Record and TLS Handshake protocols
- Explain the TLS process
Who is this for?
What You Need to Know?
More details
DescriptionThis introductory course covers key information around cryptography, Public Key Infrastructure (PKI) and Transport Layer Security (TLS) needed to be successful in today's IT career. It will cover key terms and concepts, types of ciphers, how the ciphers are used, and how public key infrastructure keeps our information safe.
Key components of the course include:
Explain the importance of cryptography in keeping our information secure
Explain ways we use cryptography to keep our information secure
Define key cybersecurity terms and concepts
Explain the role of a key and the importance of key length
Describe hashing and how itâs used
Explain how salt, pepper, and key-stretching can make storing passwords and other data more secure
Explain what symmetric encryption is and how itâs used
Explain what Public-Key cryptography is and how itâs used
List types of cryptography attacks
Explain how Public Key Infrastructure (PKI) keeps our data safe
Describe types of trust models
Explain key PKI terms
Describe what a digital certificate is and how itâs used
Explain the need for revoking certificates and list methods of revoking certificates
Explain the purpose of Transport Layer Security (TLS)
Explaining the TLS Record and TLS Handshake protocols
Explain the TLS process
Explore the Mysteries of Cryptography and Public Key Infrastructure
Master Needed Cryptography, Public Key Infrastructure (PKI) and Transport Layer Security (TLS) Knowledge and Skills for IT Certification Tests
Learn Foundational Knowledge to Accelerate Network and IT Training
Accelerate Your IT Career
Learn it Right, Learn it Well, and Reap the Rewards
Spending the time now to fully understand the core information of cryptography principles will help create a strong foundation to build off of.
Who Should Take this Course:
Those who are studying for an IT certification exam, to include A+, Network+, CCNA, Security+, CISSP, Server+, and ITF+
Those who who are new to the IT field or trying to get into an IT career
Anyone who wants to have a better understanding of cryptography and Public Key Infrastructure (PKI)
System administrators, system engineer, network administrators, network engineer, system architects, network architects, help desk technicians
Why take the course from me?
Experience: Iâve been in the IT world since 2000, have a masters in computers, and over 20 industry standard certifications
Know how to Teach: I was trained as an instructor by the USAF, have a bachelors in education, teaching since 1997, and well over 6,000 hours of classroom instruction time.
Iâve been a hiring manager since 2010, I know what skill sets employers are looking for.
TechKnowSurgeâs Unique Approach
Your instructor has training and years of experience as an educator, as a technician, and as a leader. The course implements the following features:
Microstep lectures and segmented videos that meters learning into bite size chunks. It also makes it easy to go back and review concepts when needed.
Staged-Based Educational Model where information is covered multiple times in increasing amounts of complexity. The approach helps reinforce learning and creates a knowledge and skill set less likely to fade with time.
Extensive coverage of topics to make sure topics are explained fully
Well-organized content. A tremendous amount of effort has been placed on what order content should be delivered to maximize learning and minimizing confusion.
A focus on pedagogy. A funny name, but your instructor has a deep understanding of educational theory and what drives learning.
Module overviews explaining what to expect for each module and sets a mindset for why the information is important to learn.
Video intros, overviews, and summaries to explain the intention of each video, reinforce learning, and prepare you for success.
High quality and engaging videos that use graphics, great explanations, and analogies to explain complex topics in an easy to understand way.
Real world application. Step beyond just the theory. Your instructor has real world experience and will share that with you throughout the course.
Employer insight, know what employers are looking for. Your instructor runs IT Departments and hires individuals just like you.
Content and Overview
This course has
4 Hours of content
Wealth of information
All designed to make you successful.
Whether you are going for a certification, trying to break into a career in IT, or want to advance your career, cryptography is a fundamental part of the knowledge required for success. Get ready to level up your game. Join us now and let the cryptographic fun begin!
This well organized course will has the following modules:
Course Introductions: Prepare yourself for efficiently and successfully completing the course. Youâll get an overview of what the course is all about and what you should expect out of it.
Why Cryptography: weâll explore ways cryptography is applied. This short module gives some context for how we use cryptography.
Cryptography: Participants will delve into the principles of cryptography, learning about encryption algorithms, key management, and types of ciphers, and how cryptographic techniques are used to secure data transmission and storage.
Public Key Infrastructure (PKI): Participants will gain an understanding of PKI concepts and processes, including certificate issuance, revocation, and management, and how PKI facilitates secure communication through the use of digital certificates and public-private key pairs.
Transport Layer Security (TLS): Next weâll explore how cryptographic and PKI are used to secure communications through the TLS protocol. TLS is used for much of our internet traffic.
Applied Cryptography: This module will give examples of how we use ciphers, PKI, and TLS to secure our communication and talk about specific use cases, like digital signatures and code signing. Weâll also get into some vulnerabilities in cryptography that we must be aware of when implementing cryptography.
Wrap Up: Time to wrap up the course and provide any final thoughts.
Instructor Bio
TechKnowSurge (Andrew Grimes) has been in the tech industry since 2000 and even longer as an Instructor. He started out as a Survival Instructor for the United States Air Force (USAF) in 1997. When he got out of the military, he started teaching computer classes. Wanting to advance his technical skills, he became a contractor working on a wide range of technologies while teaching technology college courses in the evening. Overtime, he became a hiring manager, director, and leader
His background includes:
Building a security program within 2 years to include becoming SOC 2 Type 2 compliant
Leading and maximizing efficiency of IT, Security, and DevOps teams
Managing SaaS company infrastructure with millions of active users
Managing small, medium, and large IT Infrastructures
Migrating technologies to the cloud
Managing multi-million dollar budgets and reducing overall budget spend year over year
Utilizing various project management techniques such as waterfall, scrum and Kanban to maximize efficiency and success
Bachelors in Workforce Education
Masters in Computer Resource and Information Management
Over 6,000 hours of teaching experience
Over 20 industry standard certifications.
Past student reviews:
âAndrew is absolutely the best instructor I've had throughout the course of my education. He is extremely knowledgeable when it comes to all things network and IT-related. Because of the education he provided, I am now working in the network engineering field, and I could not have done it without his expert guidance.â ~Michael B.
âAndrew was hands down my favorite instructor since enrollingâ âHe has great skills as an instructor, and I've learned a lot from his classes.â ~Jeff S.
âAs an instructor, he is thorough, articulate, patient and positive. He genuinely cares that his students fully comprehend the curriculum. I have a great deal of respect for Andrew. I can't recommend him highly enough.â ~Dan H.
âI found Andrew to be one of the best Instructorsâ âHe presents the information with real world applications, which helped to reinforce the concepts presented in the Cisco Certification track.â âI am truely thankful to have had him as my teacher.â ~Dan M.
âAndrew is very knowledgeable and brings his practical business experience with him. He expresses himself very well and treats everyone with respect. He explains very complicated concepts in a manner that is easy to understand.â âIt is without reservation that I would recommend Andrew as a business professional and/or teacher.â ~Adam C.
âAndrew is an excellent instructor and more.â âAndrew is the kind of teacher that you never forget.â ~ William C.
âAndrew Grimes is a first rate instructor who genuinely cares about the success of his students. I was fortunate to have Andrew as my instructor.â âI highly recommend Andrew as an instructor and IT professional.â ~Paul C.
âAndrew is a great instructor who really cares whether his students grasp the concepts he teaches. He has a passion for teaching that many couldn't muster.â ~Patrick R.
âHe was a great teacher and I would gladly take a class under him again.â ~Joshua R.
â...his style of teaching is accommodating for any level, that a student is starting off at, either beginning or advance in IT world.â ~Paul W.
âHe fosters a multidimensional environment of learning in which students of diverse abilities excel.â ~Mark B
âAndrew Grimes was a great Data Networks and Telecommunications Instructor.â âI would highly recommend him to any who desires to further their education.â ~ Tommy S.
Who this course is for:
- Those who are studying for an IT certification exam, to include A+, Network+, CCNA, Security+, CISSP, Server+, and ITF+
- Those who who are new to the IT field or trying to get into an IT career
- Anyone who wants to have a better understanding of cryptography and Public Key Infrastructure (PKI)
- System administrators, system engineer, network administrators, network engineer, system architects, network architects, help desk technicians
This introductory course covers key information around cryptography, Public Key Infrastructure (PKI) and Transport Layer Security (TLS) needed to be successful in today's IT career. It will cover key terms and concepts, types of ciphers, how the ciphers are used, and how public key infrastructure keeps our information safe.
Key components of the course include:
Explain the importance of cryptography in keeping our information secure
Explain ways we use cryptography to keep our information secure
Define key cybersecurity terms and concepts
Explain the role of a key and the importance of key length
Describe hashing and how itâs used
Explain how salt, pepper, and key-stretching can make storing passwords and other data more secure
Explain what symmetric encryption is and how itâs used
Explain what Public-Key cryptography is and how itâs used
List types of cryptography attacks
Explain how Public Key Infrastructure (PKI) keeps our data safe
Describe types of trust models
Explain key PKI terms
Describe what a digital certificate is and how itâs used
Explain the need for revoking certificates and list methods of revoking certificates
Explain the purpose of Transport Layer Security (TLS)
Explaining the TLS Record and TLS Handshake protocols
Explain the TLS process
Explore the Mysteries of Cryptography and Public Key Infrastructure
Master Needed Cryptography, Public Key Infrastructure (PKI) and Transport Layer Security (TLS) Knowledge and Skills for IT Certification Tests
Learn Foundational Knowledge to Accelerate Network and IT Training
Accelerate Your IT Career
Learn it Right, Learn it Well, and Reap the Rewards
Spending the time now to fully understand the core information of cryptography principles will help create a strong foundation to build off of.
Who Should Take this Course:
Those who are studying for an IT certification exam, to include A+, Network+, CCNA, Security+, CISSP, Server+, and ITF+
Those who who are new to the IT field or trying to get into an IT career
Anyone who wants to have a better understanding of cryptography and Public Key Infrastructure (PKI)
System administrators, system engineer, network administrators, network engineer, system architects, network architects, help desk technicians
Why take the course from me?
Experience: Iâve been in the IT world since 2000, have a masters in computers, and over 20 industry standard certifications
Know how to Teach: I was trained as an instructor by the USAF, have a bachelors in education, teaching since 1997, and well over 6,000 hours of classroom instruction time.
Iâve been a hiring manager since 2010, I know what skill sets employers are looking for.
TechKnowSurgeâs Unique Approach
Your instructor has training and years of experience as an educator, as a technician, and as a leader. The course implements the following features:
Microstep lectures and segmented videos that meters learning into bite size chunks. It also makes it easy to go back and review concepts when needed.
Staged-Based Educational Model where information is covered multiple times in increasing amounts of complexity. The approach helps reinforce learning and creates a knowledge and skill set less likely to fade with time.
Extensive coverage of topics to make sure topics are explained fully
Well-organized content. A tremendous amount of effort has been placed on what order content should be delivered to maximize learning and minimizing confusion.
A focus on pedagogy. A funny name, but your instructor has a deep understanding of educational theory and what drives learning.
Module overviews explaining what to expect for each module and sets a mindset for why the information is important to learn.
Video intros, overviews, and summaries to explain the intention of each video, reinforce learning, and prepare you for success.
High quality and engaging videos that use graphics, great explanations, and analogies to explain complex topics in an easy to understand way.
Real world application. Step beyond just the theory. Your instructor has real world experience and will share that with you throughout the course.
Employer insight, know what employers are looking for. Your instructor runs IT Departments and hires individuals just like you.
Content and Overview
This course has
4 Hours of content
Wealth of information
All designed to make you successful.
Whether you are going for a certification, trying to break into a career in IT, or want to advance your career, cryptography is a fundamental part of the knowledge required for success. Get ready to level up your game. Join us now and let the cryptographic fun begin!
This well organized course will has the following modules:
Course Introductions: Prepare yourself for efficiently and successfully completing the course. Youâll get an overview of what the course is all about and what you should expect out of it.
Why Cryptography: weâll explore ways cryptography is applied. This short module gives some context for how we use cryptography.
Cryptography: Participants will delve into the principles of cryptography, learning about encryption algorithms, key management, and types of ciphers, and how cryptographic techniques are used to secure data transmission and storage.
Public Key Infrastructure (PKI): Participants will gain an understanding of PKI concepts and processes, including certificate issuance, revocation, and management, and how PKI facilitates secure communication through the use of digital certificates and public-private key pairs.
Transport Layer Security (TLS): Next weâll explore how cryptographic and PKI are used to secure communications through the TLS protocol. TLS is used for much of our internet traffic.
Applied Cryptography: This module will give examples of how we use ciphers, PKI, and TLS to secure our communication and talk about specific use cases, like digital signatures and code signing. Weâll also get into some vulnerabilities in cryptography that we must be aware of when implementing cryptography.
Wrap Up: Time to wrap up the course and provide any final thoughts.
Instructor Bio
TechKnowSurge (Andrew Grimes) has been in the tech industry since 2000 and even longer as an Instructor. He started out as a Survival Instructor for the United States Air Force (USAF) in 1997. When he got out of the military, he started teaching computer classes. Wanting to advance his technical skills, he became a contractor working on a wide range of technologies while teaching technology college courses in the evening. Overtime, he became a hiring manager, director, and leader
His background includes:
Building a security program within 2 years to include becoming SOC 2 Type 2 compliant
Leading and maximizing efficiency of IT, Security, and DevOps teams
Managing SaaS company infrastructure with millions of active users
Managing small, medium, and large IT Infrastructures
Migrating technologies to the cloud
Managing multi-million dollar budgets and reducing overall budget spend year over year
Utilizing various project management techniques such as waterfall, scrum and Kanban to maximize efficiency and success
Bachelors in Workforce Education
Masters in Computer Resource and Information Management
Over 6,000 hours of teaching experience
Over 20 industry standard certifications.
Past student reviews:
âAndrew is absolutely the best instructor I've had throughout the course of my education. He is extremely knowledgeable when it comes to all things network and IT-related. Because of the education he provided, I am now working in the network engineering field, and I could not have done it without his expert guidance.â ~Michael B.
âAndrew was hands down my favorite instructor since enrollingâ âHe has great skills as an instructor, and I've learned a lot from his classes.â ~Jeff S.
âAs an instructor, he is thorough, articulate, patient and positive. He genuinely cares that his students fully comprehend the curriculum. I have a great deal of respect for Andrew. I can't recommend him highly enough.â ~Dan H.
âI found Andrew to be one of the best Instructorsâ âHe presents the information with real world applications, which helped to reinforce the concepts presented in the Cisco Certification track.â âI am truely thankful to have had him as my teacher.â ~Dan M.
âAndrew is very knowledgeable and brings his practical business experience with him. He expresses himself very well and treats everyone with respect. He explains very complicated concepts in a manner that is easy to understand.â âIt is without reservation that I would recommend Andrew as a business professional and/or teacher.â ~Adam C.
âAndrew is an excellent instructor and more.â âAndrew is the kind of teacher that you never forget.â ~ William C.
âAndrew Grimes is a first rate instructor who genuinely cares about the success of his students. I was fortunate to have Andrew as my instructor.â âI highly recommend Andrew as an instructor and IT professional.â ~Paul C.
âAndrew is a great instructor who really cares whether his students grasp the concepts he teaches. He has a passion for teaching that many couldn't muster.â ~Patrick R.
âHe was a great teacher and I would gladly take a class under him again.â ~Joshua R.
â...his style of teaching is accommodating for any level, that a student is starting off at, either beginning or advance in IT world.â ~Paul W.
âHe fosters a multidimensional environment of learning in which students of diverse abilities excel.â ~Mark B
âAndrew Grimes was a great Data Networks and Telecommunications Instructor.â âI would highly recommend him to any who desires to further their education.â ~ Tommy S.
Who this course is for:
- Those who are studying for an IT certification exam, to include A+, Network+, CCNA, Security+, CISSP, Server+, and ITF+
- Those who who are new to the IT field or trying to get into an IT career
- Anyone who wants to have a better understanding of cryptography and Public Key Infrastructure (PKI)
- System administrators, system engineer, network administrators, network engineer, system architects, network architects, help desk technicians
User Reviews
Rating
TechKnowSurge (Andrew Grimes)
Instructor's Courses
Udemy
View courses Udemy- language english
- Training sessions 38
- duration 3:50:52
- Release Date 2024/10/15