Welcome to the Encryption Fundamentals course! In this course, we'll explore the basic concepts of cryptography and encryption and discuss the history of the subject from ancient times to the modern day. We will also take a detailed look at how encryption works in practice and learn how we can use it to keep our data secure.
Interactive Diagram: https://interactive.linuxacademy.com/diagrams/EncryptionFundamentals.html
About the Course
Welcome to the Encryption Fundamentals course! I'm excited you're here. This course is designed to introduce you to the basics of encryption. Many security experts understand how to use encryption in practice but may not fully understand the theory behind the methods. That's the exact issue we'll tackle as we work through this course. So settle in, get yourself a cold beverage, go to the restroom if needed, and let's get started!
About the Author
Hello! I'm Justin Mitchell, the author of this course. In this video, you'll learn a little bit about me. As you progress through the course, if I can assist you in any way, please don't hesitate to reach out. You can reach me in a few different ways:On LinkedIn Via email at email@example.com Or join the Linux Academy Community Slack and follow the #security channel
Let's start the course by learning what the word "cryptography" means. In this video lesson, we'll define cryptography and ciphertext, and briefly introduce a few of the terms we need to understand for this course. In addition to the definition, we will also go over the Greek roots of the word cryptography, which will help us further understand what it is.
History of Cryptography
The history of cryptography is a lengthy and interesting one. In this video lesson, we'll dive into it!
Practical Uses of Cryptography Today
Now that we know the definition and history of cryptography, let's talk about its uses in today's computing environments. Using cryptography today provides various awesome benefits, many of which we will learn about in this video lesson.
Let's start the Encryption Algorithms section of the course by discussing symmetric encryption. This video lesson will help you understand what symmetric encryption is and why it's used. We will also discuss some of the challenges associated with symmetric encryption.
Block and Stream Ciphers
In the previous lesson, we learned about symmetric encryption. Let's continue the discussion by learning more about what block and stream ciphers are and when to use each.
Hashing can be used to verify integrity and authenticity. In this lesson, we'll discuss hashing algorithms.
As we learned in our last lesson, hashing can be used to ensure integrity and authenticity. Now that we have a good understanding of what hashing is, let's walk through a demonstration to see how file hashing works. We'll take a brief look at how changes to a file will produce a different hash, why that happens, and how that ensures integrity and authenticity.
Public Key Exchange
In this lesson, we'll learn about asymmetric encryption. We'll discuss how it works and give a brief introduction to the public key exchange section.
Public Key Infrastructure
Asymmetric encryption uses two keys: one to encrypt and the other to decrypt. We can see this in a Public Key Infrastructure, or PKI. In this lesson, we'll take a look at how a PKI works.
How a Public Key Exchange Works
Now that we understand what PKI is and how it works, let's take a look at how we can then use those keys to encrypt data in transit between a web server and a client. In this lesson, we'll learn how a web server shares its public key with a client to enable secure communications during HTTPS exchanges.
Using Encryption Tools to Secure our Data
Now that we know a little bit about encryption, let's take a look at a couple of tools and how they can help us secure our data. In this video, we'll practice using GnuPG and learn how BCrypt can help keep our data secure.
Congratulations, you've successfully completed this course! Now let's talk about what you can do with your newfound knowledge. In this video, I'll walk you through some other courses on our platform that I highly recommend as next steps in your learning adventure!