Cryptography: A Hands-on Approach

Secret-key encryption, one-way hash, public-key cryptography, digital signature, PKI, TLS, cryptocurrency and blockchain

4.79 (59 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
729
students
11 hours
content
May 2022
last update
$49.99
regular price

What you will learn

Study the basic principles of cryptography, including secret-key encryption, one-way hash function, and public-key cryptography

Study various crypto applications, including authentication, digital signature, HTTPS, credit card, blockchain, cryptocurrencies, etc.

Study the Public Key Infrastructure (PKI) and the TLS protocol, which are essential for securing communication on the Internet

Understand the risks faced by various crypto algorithms and protocols, and how these risks can be mitigated

Understand the common mistakes in the use of crypto

Gain hands-on experiences through 8 crypto labs (SEED Labs) developed by the instructor

Description

Cryptography is a foundation in cybersecurity. It is the underlying building block of many defense mechanisms, systems, and protocols.  Without crypto, we will not be able to safely conduct many things on the Internet, such as web browsing, online banking, working remotely, etc. Without crypto, blockchain and cryptocurrency will not exist.

In this course, we systematically study the basic principles of cryptography.  In particular, we focus on the three essential pillars of cryptography, including secret-key encryption, one-way hash function, and public-key cryptography. We study how they work and how they are used in the real-world applications. We also look at the risks they face, and how these risks are mitigated in the real world. Furthermore, we study the common mistakes people make when using crypto algorithms and protocols. We show how these mistakes can be exploited in attacks.

The course emphasizes hands-on learning. For each topic covered, students not only learn the theory, they also get to work on the hands-on exercises developed by the instructor. These exercises are called SEED labs, and they are being used by over 1000 institutes worldwide. The course is based on the widely-adopted textbook written by the instructor. The title of the book is "Computer & Internet Security: A Hands-on Approach".

Screenshots

Cryptography: A Hands-on Approach - Screenshot_01Cryptography: A Hands-on Approach - Screenshot_02Cryptography: A Hands-on Approach - Screenshot_03Cryptography: A Hands-on Approach - Screenshot_04

Content

Course Overview

Topics, Textbooks Labs, and the Instructor

Secret-Key Encryption

Introduction
Classical Crypto Systems
Polyalphabetical Cypher and Enigma
DES and AES
Encryption Modes
Common Mistakes on IV
Authenticated Encryption Mode: GCM
Padding
Padding Oracle Attack
Summary

One-Way Hash Function

Introduction
What Is One-Way Hash function
The MD and SHA Algorithms
Collision Attack
Applications
MAC and Hash Length Extension Attack
Summary

Public-Key Cryptography

Introduction
Diffie-Hellman Key Exchange
Math Background for RSA
The RSA Algorithm
Public Key Encryption Tools and Performance
Padding
Digital Signature
Programming
Applications of Public Key Cryptography
Summary

Public-Key Infrastructure

Introduction
The Man-In-The-Middle Attack
Overview of PKI
Public Key Certificate
Issue Certificates
Secure Web Server Using Public Key Certificate
How PKI Defeats MITM Attacks
Attacks on PKI
Summary

Transport Layer Security

Introduction
Overview of the TLS Protocol
The TLS Handshake Protocol
Data Transmission
TLS Client Program
Hostname check
TLS Server Program
TLS Proxy
Summary

Bitcoin and Blockchain

Introduction
Blockchain
Proof-of-Work Consensus (PoW)
Bitcoin History
Bitcoin Address
Bitcoin Transaction
Locking and Unlocking Transaction
Double Spending
Ethereum Blockchain
Summary

Reviews

V
May 2, 2022
Like many others, I too was eagerly waiting for this course. And, as expected, its full of valuable insights. Thank you, Professor!

Charts

Price

Cryptography: A Hands-on Approach - Price chart

Rating

Cryptography: A Hands-on Approach - Ratings chart

Enrollment distribution

Cryptography: A Hands-on Approach - Distribution chart
2624084
udemy ID
10/25/2019
course created date
4/26/2022
course indexed date
Bot
course submited by