Introduction to Encryption - Terminology and Technology

Course

Online

£ 10 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Understand the terms and expressions of encryption technologies and learn to apply encryption properlyAES-128, Public Key, Certificates? What do symmetric and asymmetric encryption actually mean? Where are these used? This course provides a basic introduction to the field of encryption.The course explains the common terminology but also the technical background. This course is right for everybody who wants to understand what encryption means in practice and what to watch out for. Smattering knowledge can be challenged, practical insights will be provided.If you care about data security and privacy – likewise on the enterprise level and in private life – you are already on the right track. This course can deepen your knowledge and turn your focus where to look at.General background knowledge in IT is an advantage but not required.Who this course is for: This course is right for anyone who cares about data security and privacy – likewise on the enterprise level and in private life. The course improves your knowledge and provides practical insights

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Understand technical terms and current technologies
Evaluate what encryption means and provides
Make technology choices with practice-orientation

This course is right for anyone who cares about data security and privacy – likewise on the enterprise level and in private life. The course improves your knowledge and provides practical insights

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Technology
  • Private
  • Algorithms
  • Motivation

Course programme

Introduction 3 lectures 08:21 Overview preview Course and chapter overview Motivation: Why do why encrypt? Why should we bother encrypting our data. What does Encrypting mean? In simple words, what is encryption basically. Introduction 3 lectures 08:21 Overview preview Course and chapter overview Motivation: Why do why encrypt? Why should we bother encrypting our data. What does Encrypting mean? In simple words, what is encryption basically. Overview preview Course and chapter overview Overview preview Course and chapter overview Overview preview Course and chapter overview Overview preview Course and chapter overview Course and chapter overview Course and chapter overview Motivation: Why do why encrypt? Why should we bother encrypting our data. Motivation: Why do why encrypt? Why should we bother encrypting our data. Motivation: Why do why encrypt? Why should we bother encrypting our data. Motivation: Why do why encrypt? Why should we bother encrypting our data. Why should we bother encrypting our data. Why should we bother encrypting our data. What does Encrypting mean? In simple words, what is encryption basically. What does Encrypting mean? In simple words, what is encryption basically. What does Encrypting mean? In simple words, what is encryption basically. What does Encrypting mean? In simple words, what is encryption basically. In simple words, what is encryption basically. In simple words, what is encryption basically. Basics of common Encryption Technologies 3 lectures 08:06 Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Basics of common Encryption Technologies 3 lectures 08:06 Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties. This chapter covers the basics of nowadays encryption technologies and their properties. This chapter covers the basics of nowadays encryption technologies and their properties. Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties. This chapter covers the basics of nowadays encryption technologies and their properties. This chapter covers the basics of nowadays encryption technologies and their properties. Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties. Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties. This chapter covers the basics of nowadays encryption technologies and their properties. This chapter covers the basics of nowadays encryption technologies and their properties. Technical Aspects of Encryption 4 lectures 13:41 Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level. Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Aspects of Encryption 4 lectures 13:41 Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level. Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level. Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level. Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level. Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level. Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level. In this chapter, we take a deeper look at the aspects of encryption on the technical level. In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level. In this chapter, we take a deeper look at the aspects of encryption on the technical level. In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level. Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level. In this chapter, we take a deeper look at the aspects of encryption on the technical level. In this chapter, we take a deeper look at the aspects of encryption on the technical level. Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level. Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level. Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level. Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level. In this chapter, we take a deeper look at the aspects of encryption on the technical level. In this chapter, we take a deeper look at the aspects of encryption on the technical level. File and System encryption 1 lecture 06:43 File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP. File and System encryption 1 lecture 06:43 File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP. File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP. File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP. File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP. File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP. This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP. This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP. Conclusion 1 lecture 01:19 Conclusion Conclusion Conclusion 1 lecture 01:19 Conclusion Conclusion Conclusion Conclusion Conclusion Conclusion Conclusion Conclusion Conclusion Conclusion Conclusion Conclusion

Additional information

You should have a basic interest in the fields of data security, privacy and technology

Introduction to Encryption - Terminology and Technology

£ 10 + VAT