File Encryption Basics and Practices with CrococryptFile

Course

Online

£ 10 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

In this course, you will learn how to use CrococryptFile, the open-source file encryption solution. Learn what encryption means on the technical level – as a background information to choose the right file encryption method for your case. If you care about privacy and if you are willing to do something about it, you are already on the right track. This applies for enterprise and private users alike.First, you will get an introduction on encryption in general to understand the characteristics of the different existing technologies. Then, we will go through the application family step-by-step: Windows, Linux, Web-based and Command-line interface.IT background would be a plus but is not required to take this course.THIS IS A FOREVER FREE COURSE TO SUPPORT THE OPEN-SOURCE SOFTWARE "CROCOCRYPTFILE"!

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

At the end of my course, students will be able to
Choose appropriate encryption methods for sensitive data files
Challenge security claims about encryption
Deploy CrococryptFile in a SMB enterprise environment

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Install
  • Installation
  • Server
  • Unix
  • Linux
  • Windows

Course programme

Introduction and Basics 1 lecture 17:04 Introduction to Encryption and File-encryption This lecture gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level. Introduction and Basics 1 lecture 17:04 Introduction to Encryption and File-encryption This lecture gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level. Introduction to Encryption and File-encryption This lecture gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level. Introduction to Encryption and File-encryption This lecture gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level. Introduction to Encryption and File-encryption This lecture gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level. Introduction to Encryption and File-encryption This lecture gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level. This lecture gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level. This lecture gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level. CrococryptFile in Practice 5 lectures 25:57 CrococryptFile Windows Installation This lecture contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components. Password-based Encryption, Decryption and WebDecrypt This lecture demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family. Token-based Encryption with Windows Keystore and OpenPGP This lecture demonstrates how to use tokens to encrypt file archives with CrococryptFile. Forensics on Headerless encrypted Files This lecture explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile. Linux, Unix and Command-line usage This lecture demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes. CrococryptFile in Practice 5 lectures 25:57 CrococryptFile Windows Installation This lecture contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components. Password-based Encryption, Decryption and WebDecrypt This lecture demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family. Token-based Encryption with Windows Keystore and OpenPGP This lecture demonstrates how to use tokens to encrypt file archives with CrococryptFile. Forensics on Headerless encrypted Files This lecture explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile. Linux, Unix and Command-line usage This lecture demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes. CrococryptFile Windows Installation This lecture contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components. CrococryptFile Windows Installation This lecture contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components. CrococryptFile Windows Installation This lecture contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components. CrococryptFile Windows Installation This lecture contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components. This lecture contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components. This lecture contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components. Password-based Encryption, Decryption and WebDecrypt This lecture demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family. Password-based Encryption, Decryption and WebDecrypt This lecture demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family. Password-based Encryption, Decryption and WebDecrypt This lecture demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family. Password-based Encryption, Decryption and WebDecrypt This lecture demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family. This lecture demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family. This lecture demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family. Token-based Encryption with Windows Keystore and OpenPGP This lecture demonstrates how to use tokens to encrypt file archives with CrococryptFile. Token-based Encryption with Windows Keystore and OpenPGP This lecture demonstrates how to use tokens to encrypt file archives with CrococryptFile. Token-based Encryption with Windows Keystore and OpenPGP This lecture demonstrates how to use tokens to encrypt file archives with CrococryptFile. Token-based Encryption with Windows Keystore and OpenPGP This lecture demonstrates how to use tokens to encrypt file archives with CrococryptFile. This lecture demonstrates how to use tokens to encrypt file archives with CrococryptFile. This lecture demonstrates how to use tokens to encrypt file archives with CrococryptFile. Forensics on Headerless encrypted Files This lecture explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile. Forensics on Headerless encrypted Files This lecture explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile. Forensics on Headerless encrypted Files This lecture explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile. Forensics on Headerless encrypted Files This lecture explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile. This lecture explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile. This lecture explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile. Linux, Unix and Command-line usage This lecture demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes. Linux, Unix and Command-line usage This lecture demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes. Linux, Unix and Command-line usage This lecture demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes. Linux, Unix and Command-line usage This lecture demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes. This lecture demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes. This lecture demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes.

Additional information

This course is meant for everyone with an interest in data privacy and especially in privacy for data files This applies for offline and online security of files, e.g., encrypting files appropriately on your local computer, your company laptop, for your cloud storage or for file interchange Basic IT and crypto knowledge is a plus but not required

File Encryption Basics and Practices with CrococryptFile

£ 10 + VAT