Cryptography Primer

Attendees of this class will learn the fundamentals of cryptography. (Dec 2020)

rate limit

Code not recognized.

About this course

The target audience are those unfamiliar with how cryptography works or those very rusty and in need of a refresher. Both symmetric and asymmetric cryptography will be covered and examples will be shown on how each are used in real-world examples. It will be shown how identity is created and used for authentication, integrity, and confidentiality.  Due to time limitations, math proofs of these functions are unable to be presented.  Only practical use is covered.

Curriculum80 min

  • Class Syllabus
  • Introduction
  • Introduction 1 min
  • Our Background 2 min
  • Perceptions and Expectations
  • Perceptions and Expectations 5 min
  • Knowledge Check 2 min
  • Authentication, Integrity & Confidentiality
  • CIA 4 min
  • Authentication 4 min
  • Knowledge Check 2 min
  • Cryptographic Building Blocks
  • Hash Function 5 min
  • Knowledge Check 2 min
  • Symmetric Key 4 min
  • Knowledge Check 2 min
  • Message Authentication 7 min
  • Session Keys 4 min
  • Knowledge Check 2 min
  • Asymmetric Cryptography 6 min
  • Knowledge Check 2 min
  • Chain of Trust 6 min
  • Knowledge Check 2 min
  • A real-world example
  • Application Example 5 min
  • Knowledge Check 2 min
  • Elliptic Curve Diffie - Hellman Example 8 min
  • Knowledge Check 2 min
  • Wrap Up
  • Closing 2 min
  • Your Feedback
  • We need your Feedback

About this course

The target audience are those unfamiliar with how cryptography works or those very rusty and in need of a refresher. Both symmetric and asymmetric cryptography will be covered and examples will be shown on how each are used in real-world examples. It will be shown how identity is created and used for authentication, integrity, and confidentiality.  Due to time limitations, math proofs of these functions are unable to be presented.  Only practical use is covered.

Curriculum80 min

  • Class Syllabus
  • Introduction
  • Introduction 1 min
  • Our Background 2 min
  • Perceptions and Expectations
  • Perceptions and Expectations 5 min
  • Knowledge Check 2 min
  • Authentication, Integrity & Confidentiality
  • CIA 4 min
  • Authentication 4 min
  • Knowledge Check 2 min
  • Cryptographic Building Blocks
  • Hash Function 5 min
  • Knowledge Check 2 min
  • Symmetric Key 4 min
  • Knowledge Check 2 min
  • Message Authentication 7 min
  • Session Keys 4 min
  • Knowledge Check 2 min
  • Asymmetric Cryptography 6 min
  • Knowledge Check 2 min
  • Chain of Trust 6 min
  • Knowledge Check 2 min
  • A real-world example
  • Application Example 5 min
  • Knowledge Check 2 min
  • Elliptic Curve Diffie - Hellman Example 8 min
  • Knowledge Check 2 min
  • Wrap Up
  • Closing 2 min
  • Your Feedback
  • We need your Feedback