Understand the terms and expressions of encryption technologies and learn to apply encryption properlyAES-128, Public Key, Certificates? What do symmetric and asymmetric encryption actually mean? Where are these used? This course provides a basic introduction to the field of encryption.The course explains the common terminology but also the technical background. This course is right for everybody who wants to understand what encryption means in practice and what to watch out for. Smattering knowledge can be challenged, practical insights will be provided.If you care about data security and privacy – likewise on the enterprise level and in private life – you are already on the right track. This course can deepen your knowledge and turn your focus where to look at.General background knowledge in IT is an advantage but not required.Who this course is for: This course is right for anyone who cares about data security and privacy – likewise on the enterprise level and in private life. The course improves your knowledge and provides practical insights
Facilities
Location
Start date
Online
Start date
Different dates availableEnrolment now open
About this course
Understand technical terms and current technologies
Evaluate what encryption means and provides
Make technology choices with practice-orientation
This course is right for anyone who cares about data security and privacy – likewise on the enterprise level and in private life. The course improves your knowledge and provides practical insights
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
We are verifying your question adjusts to our publishing rules. According to your answers, we noticed you might not be elegible to enroll into this course, possibly because of: qualification requirements, location or others. It is important you consult this with the Centre.
Thank you!
We are reviewing your question. We will publish it shortly.
Or do you prefer the center to contact you?
Reviews
Have you taken this course? Share your opinion
This centre's achievements
2021
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
Technology
Private
Algorithms
Motivation
Course programme
Introduction
3 lectures08:21Overview preview Course and chapter overviewMotivation: Why do why encrypt? Why should we bother encrypting our data.What does Encrypting mean? In simple words, what is encryption basically.
Introduction
3 lectures08:21Overview preview Course and chapter overviewMotivation: Why do why encrypt? Why should we bother encrypting our data.What does Encrypting mean? In simple words, what is encryption basically.
Overview preview Course and chapter overview
Overview preview Course and chapter overview
Overview preview Course and chapter overview
Overview preview Course and chapter overview
Course and chapter overview
Course and chapter overview
Motivation: Why do why encrypt? Why should we bother encrypting our data.
Motivation: Why do why encrypt? Why should we bother encrypting our data.
Motivation: Why do why encrypt? Why should we bother encrypting our data.
Motivation: Why do why encrypt? Why should we bother encrypting our data.
Why should we bother encrypting our data.
Why should we bother encrypting our data.
What does Encrypting mean? In simple words, what is encryption basically.
What does Encrypting mean? In simple words, what is encryption basically.
What does Encrypting mean? In simple words, what is encryption basically.
What does Encrypting mean? In simple words, what is encryption basically.
In simple words, what is encryption basically.
In simple words, what is encryption basically.
Basics of common Encryption Technologies
3 lectures08:06Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties.Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties.Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
Basics of common Encryption Technologies
3 lectures08:06Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties.Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties.Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
Basics: Symmetric and asymmetric Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
This chapter covers the basics of nowadays encryption technologies and their properties.
This chapter covers the basics of nowadays encryption technologies and their properties.
Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
Hybrid Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
This chapter covers the basics of nowadays encryption technologies and their properties.
This chapter covers the basics of nowadays encryption technologies and their properties.
Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
Password-based Encryption This chapter covers the basics of nowadays encryption technologies and their properties.
This chapter covers the basics of nowadays encryption technologies and their properties.
This chapter covers the basics of nowadays encryption technologies and their properties.
Technical Aspects of Encryption
4 lectures13:41Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level.Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level.Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level.Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Technical Aspects of Encryption
4 lectures13:41Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level.Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level.Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level.Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Algorithms In this chapter, we take a deeper look at the aspects of encryption on the technical level.
In this chapter, we take a deeper look at the aspects of encryption on the technical level.
In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Technical Parameters for Encryption I In this chapter, we take a deeper look at the aspects of encryption on the technical level.
In this chapter, we take a deeper look at the aspects of encryption on the technical level.
In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Technical Parameters for Encryption II In this chapter, we take a deeper look at the aspects of encryption on the technical level.
In this chapter, we take a deeper look at the aspects of encryption on the technical level.
In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level.
Cryptographic Key Formats In this chapter, we take a deeper look at the aspects of encryption on the technical level.
In this chapter, we take a deeper look at the aspects of encryption on the technical level.
In this chapter, we take a deeper look at the aspects of encryption on the technical level.
File and System encryption
1 lecture06:43File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP.
File and System encryption
1 lecture06:43File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP.
File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP.
File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP.
File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP.
File and System encryption This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP.
This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP.
This chapter covers the basic features and practices of file and system encryption including TrueCrypt, ZIP and OpenPGP.
Conclusion
1 lecture01:19Conclusion Conclusion
Conclusion
1 lecture01:19Conclusion Conclusion
Conclusion Conclusion
Conclusion Conclusion
Conclusion Conclusion
Conclusion Conclusion
Conclusion
Conclusion
Additional information
You should have a basic interest in the fields of data security, privacy and technology