Cryptography & Security

Cryptography Techniques & Information Security: A Comprehensive Guide

7h 59m43 lectures13 sections

What you'll learn

  • Understand information security basics
  • Learn number theory applications
  • Master classical and modern encryption
  • Recognize digital signatures
  • Manage keys in encryption
  • Apply data protection techniques

About this course

In this course, we will explore the essential tools and techniques used to protect data and information in the modern internet world. We will learn how to secure digital data and information, and how secret codes can provide an additional layer of protection. We will delve into information security and encryption, and how they can be used to protect data from cyberattacks and other security threats. We will also learn about the latest technologies and tools used in this field, and how they can be utilized to enhance security and privacy. Additionally, we will cover topics such as cybersecurity, network security, cloud security, mobile security, and other related subjects.

Expected outcomes

  • Comprehensive understanding of encryption and information security principles.
  • Applying encryption techniques to secure data.
  • Efficiently managing keys and digital signatures.
  • Ability to analyze and secure networks and information.

Course content

1

Information and Network Security Concepts

3 lectures
  1. Information and Network Security Concepts (Lecture 1)12:56
  2. Information and Network Security Concepts (Lecture 2)13:29
  3. Information and Network Security Concepts (Lecture 3)20:14
2

Introduction to Number Theory

4 lectures
  1. Introduction to Number Theory (Lecture One)5:10
  2. Introduction to Number Theory (Lecture Two)14:39
  3. Introduction to Number Theory (Lecture Three)13:18
  4. Introduction to Number Theory (Lecture Four)14:38
3

Advanced Concepts in Number Theory

6 lectures
  1. Advanced Concepts in Number Theory (Lecture One)9:38
  2. Advanced Concepts in Number Theory (Lecture Two)7:29
  3. Advanced Concepts in Number Theory (Lecture Three)9:46
  4. Advanced Concepts in Number Theory (Lecture 4)12:24
  5. Advanced Concepts in Number Theory (Lecture 5)7:29
  6. Advanced Concepts in Number Theory (Lecture 6)5:32
4

Classical Encryption Techniques

6 lectures
  1. Classical Encryption Techniques (Lecture 1)8:27
  2. Classical Encryption Techniques (Lecture 2)6:54
  3. Classical Encryption Techniques (Lecture 3)10:21
  4. Classical Encryption Techniques (Lecture 4)7:17
  5. Classical Encryption Techniques (Lecture 5)5:36
  6. Classical Encryption Techniques (Lecture 6)6:02
5

Data Encryption Standard (DES)

2 lectures
  1. Data Encryption Standard (Lecture 1)7:46
  2. Data Encryption Standard (Lecture 2)10:55
6

Block Ciphers - Advanced Encryption Standard (AES)

3 lectures
  1. Block Ciphers - Advanced Encryption Standard (Lecture 1)15:02
  2. Block Ciphers - Advanced Encryption Standard (Lecture 2)9:49
  3. Block Ciphers - Advanced Encryption Standard (Lecture 3)14:47
7

Block Cipher Operation

2 lectures
  1. Block Cipher Operation (Lecture 1)10:11
  2. Block Cipher Operation (Lecture 2)20:00
8

Random Number Generators

2 lectures
  1. Random Number Generators (Lecture 1)13:43
  2. Random Number Generators (Lecture 2)12:31
9

Public-Key Cryptography and RSA

3 lectures
  1. Public Key Encryption (Lecture 1)12:31
  2. Public Key Encryption (Lecture 2)14:50
  3. Public Key Encryption (Lecture 3)5:44
10

Advanced algorithms In Encryption

3 lectures
  1. Advanced Algorithms in Encryption (Lecture 1)9:36
  2. Advanced Algorithms in Encryption (Lecture 2)12:23
  3. Advanced Algorithms in Encryption (Lecture 3)11:35
11

Cryptographic Hash functions and MAC

5 lectures
  1. Cryptographic Hash Functions and Extended Message Codes (Lecture 1)14:29
  2. Cryptographic Hash Functions and Extended Message Codes (Lecture 2)11:42
  3. Cryptographic Hash Functions and Extended Message Codes (Lecture 3)9:48
  4. Cryptographic Hash Functions and Extended Message Codes (Lecture 4)14:33
  5. Cryptographic Hash Functions and Extended Message Codes (Lecture 5)16:46
12

Digital Signatures

2 lectures
  1. Digital Signatures (Lecture 1)9:22
  2. Digital Signatures (Lecture 2)9:05
13

Key Management and Distribution

2 lectures
  1. Key Management and Distribution (Lecture 1)12:17
  2. Key Management and Distribution (Lecture 2)8:51

Instructor

Eng. Ziad Mahmoud

Eng. Ziad Mahmoud

Teaching assistant at Faros University, Ziad has delivered over 3000 training and consulting hours to more than 600 trainees.
5,556 students4 courses

This course is part of the diploma

  • Cybersecurity Fundamentals DiplomaDiploma
    4.6|6|38 h

    Cybersecurity Fundamentals Diploma

    6 courses
    $59.99
    Buy now

Related courses

  • CCNA Cisco Network
    4.6|5,045|5h 57m

    CCNA Cisco Network

    Network Installation and Management Skills

    Eng. Ahmed Haykal
    Eng. Ahmed Haykal
    $19.99
    Buy now
  • Linux Operating Systems
    4.7|4,954|14h 25m

    Linux Operating Systems

    Learn and Master Linux Operating Skills

    Eng. Ahmed Haykal
    Eng. Ahmed Haykal
    $19.99
    Buy now
  • Cyber Security Fundamentals
    4.9|5,485|13h 6m

    Cyber Security Fundamentals

    Comprehensive Professional Course in Information Security

    Eng. Moamen Mohamed
    Eng. Moamen Mohamed
    $19.99
    Buy now
  • WiFi Hacking and Security
    4.9|5,234|3h 44m

    WiFi Hacking and Security

    Master Network Vulnerability Discovery

    Eng. Kanaan Al-Hallaj
    Eng. Kanaan Al-Hallaj
    $19.99
    Buy now