Description: Using cryptography is far more than just selecting an algorithm and calling the encrypt or decrypt method. In this course, you will learn about the modes of operation for encryption algorithms as well as when particular algorithms are best suited to the data being protected. You will also learn how to manage cryptographic keys and how cryptanalysis can be used against weak cryptographic systems (even when using strong algorithms).
Target Audience: System administrators, database administrators, security professionals, software developers, and anyone who has to work with compliancy or regulations that require data protection
Duration: 01:45
Description: Cryptography, and understanding its limits and pitfalls, is essential to protecting data. In this course, you will learn about how cryptography can be used to protect and secure data, different methods that exist to protect or transmit data securely, and the components that need to be understood to ensure data can be protected properly.
Target Audience: System administrators, database administrators, security professionals, software developers, and anyone who has to work with compliancy or regulations that require data protection.
Duration: 01:32