Skip to main content

Encryption Fundamentals


Intro Video

Photo of Justin Mitchell

Justin Mitchell

Training Architect







Course Details

Welcome to the Encryption Fundamentals course! In this course, we'll explore the basic concepts of cryptography and encryption and discuss the history of the subject from ancient times to the modern day. We will also take a detailed look at how encryption works in practice and learn how we can use it to keep our data secure.

Interactive Diagram:


Encryption Fundamentals


About the Course


Lesson Description:

Welcome to the Encryption Fundamentals course! I'm excited you're here. This course is designed to introduce you to the basics of encryption. Many security experts understand how to use encryption in practice but may not fully understand the theory behind the methods. That's the exact issue we'll tackle as we work through this course. So settle in, get yourself a cold beverage, go to the restroom if needed, and let's get started!

About the Author


Lesson Description:

Hello! I'm Justin Mitchell, the author of this course. In this video, you'll learn a little bit about me. As you progress through the course, if I can assist you in any way, please don't hesitate to reach out. You can reach me in a few different ways: On LinkedIn Via email at Or join the Linux Academy Community Slack and follow the #security channel


Defining Cryptography


Lesson Description:

Let's start the course by learning what the word "cryptography" means. In this video lesson, we'll define cryptography and ciphertext, and briefly introduce a few of the terms we need to understand for this course. In addition to the definition, we will also go over the Greek roots of the word cryptography, which will help us further understand what it is.

History of Cryptography


Lesson Description:

The history of cryptography is a lengthy and interesting one. In this video lesson, we'll dive into it!

Practical Uses of Cryptography Today


Lesson Description:

Now that we know the definition and history of cryptography, let's talk about its uses in today's computing environments. Using cryptography today provides various awesome benefits, many of which we will learn about in this video lesson.

Encryption Algorithms

Symmetric Encryption


Lesson Description:

Let's start the Encryption Algorithms section of the course by discussing symmetric encryption. This video lesson will help you understand what symmetric encryption is and why it's used. We will also discuss some of the challenges associated with symmetric encryption.

Block and Stream Ciphers


Lesson Description:

In the previous lesson, we learned about symmetric encryption. Let's continue the discussion by learning more about what block and stream ciphers are and when to use each.

Hashing Algorithms


Lesson Description:

Hashing can be used to verify integrity and authenticity. In this lesson, we'll discuss hashing algorithms.

File Hashing


Lesson Description:

As we learned in our last lesson, hashing can be used to ensure integrity and authenticity. Now that we have a good understanding of what hashing is, let's walk through a demonstration to see how file hashing works. We'll take a brief look at how changes to a file will produce a different hash, why that happens, and how that ensures integrity and authenticity.

Public Key Exchange

Asymmetric Encryption


Lesson Description:

In this lesson, we'll learn about asymmetric encryption. We'll discuss how it works and give a brief introduction to the public key exchange section.

Public Key Infrastructure


Lesson Description:

Asymmetric encryption uses two keys: one to encrypt and the other to decrypt. We can see this in a Public Key Infrastructure, or PKI. In this lesson, we'll take a look at how a PKI works.

How a Public Key Exchange Works


Lesson Description:

Now that we understand what PKI is and how it works, let's take a look at how we can then use those keys to encrypt data in transit between a web server and a client. In this lesson, we'll learn how a web server shares its public key with a client to enable secure communications during HTTPS exchanges.

Using Encryption Tools to Secure our Data


Lesson Description:

Now that we know a little bit about encryption, let's take a look at a couple of tools and how they can help us secure our data. In this video, we'll practice using GnuPG and learn how BCrypt can help keep our data secure.


What's Next?


Lesson Description:

Congratulations, you've successfully completed this course! Now let's talk about what you can do with your newfound knowledge. In this video, I'll walk you through some other courses on our platform that I highly recommend as next steps in your learning adventure!