Search result for Symmetric key encryption Online Courses & Certifications
Get Course Alerts by Email
IPSEC VPN Tunnel on MikroTik
by Maher Haddad- 4.7
3.5 hours on-demand video
Understand what is Symmetric key encryption Understand what is Asymmetric key encryption Understand how DH works to share the secret key in a secure way Understand the encryption protocols such as: DES, 3DES, AES, Blowfish, Camellia, RSA & DH Understand the types of IPSEC authentication: Pre-shared key vs Certificate...
$12.99
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
We’ll give you some background of encryption algorithms and how they’re used to safeguard data. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. Symmetric Cryptography Symmetric Encryption Algorithms Symmetric Encryption Public Key or Asymmetric Encryption Supplementary reading for WEP Encryption and Why You Shouldn't Use It Disk Encryption...
Cryptographic Hash and Integrity Protection
by Sang-Yoon Chang- 4.5
Approx. 9 hours to complete
Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. Message Authentication Approaches and Using Symmetric Encryption for Message Authentication Alice Uses Her Private Key...
MikroTik Security Engineer with LABS
by Maher Haddad- 0.0
12.5 hours on-demand video
Become a MikroTik Security Professional and be ready for the MikroTik MTCSE exam ***This course is not officially sponsored by MikroTik and not an authorized course by MikroTik. We are neither affiliated with nor endorsed by MikroTik. We respect the Trademarks of the mentioned company and institution. *** This course is based on the MikroTik MTCSE syllabus....
$13.99
Network Security - Protocols
by Aspen Olmsted- 0.0
5 Weeks
Students are provided with a broad understanding of cryptography, from its classical applications dating from the Roman empire to modern cryptography, including the public key cryptography and hashing techniques today. Describe at least two strategies for breaking an encryption scheme Identify the differences between public key encryption, symmetric key encryption, and hashing...
$166
Symmetric Cryptography
by Sang-Yoon Chang- 4.6
Approx. 13 hours to complete
Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. Advanced Encryption Standard (AES) Symmetric Algorithm Survey...
Ethical Hacking and Network Security from Scratch 2021
by Andrei Dumitrescu- 4.7
15 hours on-demand video
At the end of this course, you will MASTER the key concepts and you will become an Ethical Hacker and Network Security Expert. Full Disk Encryption (Data at rest protection) You will MASTER Ethical Hacking and Network Security Key Concepts (Reconnaissance, Sniffing, Exploitation . Acquire an In-Depth Understanding of GnuPG (symmetric and asymmetric encryption, key management, digital signatures)....
$18.99
Related searches
Bitcoin: Pass The Certified Bitcoin Professional Exam
by Nick Walsh- 4.1
1 hour on-demand video
Wallets, Clients and Key ManagementWallet TypesBitcoin ClientsDeterministic Wallets (AKA BIP32)Passphrase-Encrypted Wallets (AKA BIP38)BackupImporting and Exporting Bitcoin CommerceBitcoin as a MerchantBitcoin Payment ProcessorsSecure Payment Protocol (AKA BIP70)Join this Bitcoin Certified Professional Course to protect yourself and your Bitcoins from key logging hackers!...
$9.99
Blockchain Business Models
by Cam Harvey- 4.7
Approx. 12 hours to complete
Key Takeaways Blockchain Encryption and Signatures Symmetric Digital Signatures Symmetric Ciphers Encryption and Digital Signatures Graded Quiz...