
Cryptography & Security
Cryptography Techniques & Information Security: A Comprehensive Guide
What you'll learn
- Understand information security basics
- Learn number theory applications
- Master classical and modern encryption
- Recognize digital signatures
- Manage keys in encryption
- Apply data protection techniques
About this course
In this course, we will explore the essential tools and techniques used to protect data and information in the modern internet world. We will learn how to secure digital data and information, and how secret codes can provide an additional layer of protection. We will delve into information security and encryption, and how they can be used to protect data from cyberattacks and other security threats. We will also learn about the latest technologies and tools used in this field, and how they can be utilized to enhance security and privacy. Additionally, we will cover topics such as cybersecurity, network security, cloud security, mobile security, and other related subjects.
Expected outcomes
- Comprehensive understanding of encryption and information security principles.
- Applying encryption techniques to secure data.
- Efficiently managing keys and digital signatures.
- Ability to analyze and secure networks and information.
Course content
1Information and Network Security Concepts
3 lectures
2Introduction to Number Theory
4 lectures
- Introduction to Number Theory (Lecture One)5:10
- Introduction to Number Theory (Lecture Two)14:39
- Introduction to Number Theory (Lecture Three)13:18
- Introduction to Number Theory (Lecture Four)14:38
3Advanced Concepts in Number Theory
6 lectures
- Advanced Concepts in Number Theory (Lecture One)9:38
- Advanced Concepts in Number Theory (Lecture Two)7:29
- Advanced Concepts in Number Theory (Lecture Three)9:46
- Advanced Concepts in Number Theory (Lecture 4)12:24
- Advanced Concepts in Number Theory (Lecture 5)7:29
- Advanced Concepts in Number Theory (Lecture 6)5:32
4Classical Encryption Techniques
6 lectures
- Classical Encryption Techniques (Lecture 1)8:27
- Classical Encryption Techniques (Lecture 2)6:54
- Classical Encryption Techniques (Lecture 3)10:21
- Classical Encryption Techniques (Lecture 4)7:17
- Classical Encryption Techniques (Lecture 5)5:36
- Classical Encryption Techniques (Lecture 6)6:02
5Data Encryption Standard (DES)
2 lectures
- Data Encryption Standard (Lecture 1)7:46
- Data Encryption Standard (Lecture 2)10:55
6Block Ciphers - Advanced Encryption Standard (AES)
3 lectures
- Block Ciphers - Advanced Encryption Standard (Lecture 1)15:02
- Block Ciphers - Advanced Encryption Standard (Lecture 2)9:49
- Block Ciphers - Advanced Encryption Standard (Lecture 3)14:47
7Block Cipher Operation
2 lectures
- Block Cipher Operation (Lecture 1)10:11
- Block Cipher Operation (Lecture 2)20:00
8Random Number Generators
2 lectures
- Random Number Generators (Lecture 1)13:43
- Random Number Generators (Lecture 2)12:31
9Public-Key Cryptography and RSA
3 lectures
- Public Key Encryption (Lecture 1)12:31
- Public Key Encryption (Lecture 2)14:50
- Public Key Encryption (Lecture 3)5:44
10Advanced algorithms In Encryption
3 lectures
- Advanced Algorithms in Encryption (Lecture 1)9:36
- Advanced Algorithms in Encryption (Lecture 2)12:23
- Advanced Algorithms in Encryption (Lecture 3)11:35
11Cryptographic Hash functions and MAC
5 lectures
- Cryptographic Hash Functions and Extended Message Codes (Lecture 1)14:29
- Cryptographic Hash Functions and Extended Message Codes (Lecture 2)11:42
- Cryptographic Hash Functions and Extended Message Codes (Lecture 3)9:48
- Cryptographic Hash Functions and Extended Message Codes (Lecture 4)14:33
- Cryptographic Hash Functions and Extended Message Codes (Lecture 5)16:46
12Digital Signatures
2 lectures
- Digital Signatures (Lecture 1)9:22
- Digital Signatures (Lecture 2)9:05
13Key Management and Distribution
2 lectures
- Key Management and Distribution (Lecture 1)12:17
- Key Management and Distribution (Lecture 2)8:51
Instructor

Eng. Ziad Mahmoud
This course is part of the diploma







