Currently Empty: $0.00
About Course
As the size and frequency of data breaches increasing over time, more and more organizations are rapidly recognizing that encryption is no longer an option. They are busy formulating comprehensive strategy and shifting their stance towards encryption technologies and rapidly deploying a range of technologies to defend and protect their sensitive data from internal and external threats. Increasingly, business users are influencing the adoption of encryption technologies more than IT operations teams.
Adoption of encryption in organizations are increasing at a rapid pace as are the urgency in the encryption implementation plans. The increasing rate of adoption is due to fast evolving regulations and necessity to protect sensitive data across enterprise networks, multiple devices and especially the increasing move to storing data on a cloud.
Course Content
Module 01: Introduction and History of Cryptography
-
What is Cryptography?
-
History of Cryptography
-
Mono-Alphabet Substitution (Caesar Cipher, Atbash Cipher, Affine Cipher, ROT13 Cipher)
-
Multi-Alphabet Substitution (Cipher Disk, Vigenère Cipher, Playfair Cipher, ADFGVX Cipher)
-
Homophonic Substitution
-
Null and Book Ciphers
-
Rail Fence Ciphers
-
The Enigma Machine
-
CrypTool