Cryptography Crash Course

Learn and apply cryptography techniques using openSSL

Instructed by ofer shmueli

Want to learn more?
Go for Premium Subscription

Choose your plan:

  • Monthly
  • Annually
$ 29
Monthly Subscription
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
Need Help?

Call +1 855 999 1795

( Toll Free )
  • You will understand the theory and practical use of cryptography . you will feel very comfortable ( Hands-on ) with symmetric encryption, asymmetric encryption and hash functions by the end

 OpenSSL and Cryptography - Beginners Guide

A complete Guide

That will walk you through the secrets of:

Encryption, symmetric keys, ciphers, digital signatures using openSSL

 This course is Hands On. I will  teach you the theory and  the practical usage.

You will understand how HTTPS works with public key cryptography and how to use Hash functions to keep your files integrity safe

 

WHY openSSL cryptography ?

Cryptography is everywhere, if you are an ethical hacker, Developer, an IT manager or anyone who hangs around with technology, than this is the stuff that you deal with everyday 

In this course you will learn to generate symmetric keys , public keys, certificate request, hash functions and more

You will understand the theoretical concepts of encryption using public and private keys , and use the power of openSSL to apply them

 

This course is HANDS ON . no power points or fancy words .

 

WHAT WILL YOU LEARN

  • how encryption works

  • when do we use encryption

  • cipher algorithm operations

  • what are symmetric keys

  • generate and apply symmetric keys on openSSL

  • hash functions

  • when do we use hash functions for integrity and when for confidentiality

  • hash different files on your computers

  • public key cryptography

  • the theory beyond public and private key

  • digital signatures

  • create your own certificate signing request

  • crate your own self sign request

     

TARGET AUDIENCE

  • Students who have little or no experience in cryptography, and are curious to finally understand the mysterious concepts

  • Anyone who is interested in encryption and hashing techniques , wants to understand and learn how to apply them

  • Ethical hackers, web developers and developers who wants to extend their knowledge on cryptography 

  • Motivation, curiosity, and openssl software installed
  • comfortable with command line interface
View More...

Section 1 : Introduction

  • Lecture 1 :
  • Lecture 2 :
  • First set-up

Section 2 : Encryption and Keys

  • Lecture 1 :
  • Why do we need encryption
  • Lecture 2 :
  • Generating Keys
  • Lecture 3 :
  • Key Space
  • Lecture 4 :
  • Cipher Algorithm
  • Lecture 5 :
  • Algorithm operation part 1
  • Lecture 6 :
  • Algorithm Operation Part 2
  • Lecture 7 :
  • Encryption With Symmetric Key Part 1
  • Lecture 8 :
  • Encryption With Symmetric Key Part 2
  • Lecture 9 :
  • Encryption And Decryption Summary
  • Lecture 10 :
  • Speed Test

Section 3 : Hash Functions

  • Lecture 1 :
  • Hash Intro
  • Lecture 2 :
  • One way Function
  • Lecture 3 :
  • Integrity Check
  • Lecture 4 :
  • Hash Check 2 Files
  • Lecture 5 :
  • Encrypted Hash
  • Lecture 6 :
  • Confideniality
  • Lecture 7 :
  • Hashed Passwords in Linux
  • Lecture 8 :
  • Hash MP3
  • Lecture 9 :
  • Hash Speed Test

Section 4 : Public Key Cryptography

  • Lecture 1 :
  • Public and Private Key Intro
  • Lecture 2 :
  • Generate Your First Private Key
  • Lecture 3 :
  • Digital Signatures
  • Lecture 4 :
  • HTTPS Part 1
  • Lecture 5 :
  • HTTPS Part 2
  • Lecture 6 :
  • Certificates server side
  • Lecture 7 :
  • Certificates Browser Side
  • Lecture 8 :
  • Create Your First Certificate Request
  • Lecture 9 :
  • Self Sign Your Certificate

ofer shmueli,

I have 15 years of experience in Network  security and  Wi-Fi deployments. i have worked as a director of products, innovation and development in telecom companies ( orange IL ) and VP product for professional services companies.  I have a Ruckus Wi-Fi WISE certification , a Cisco CCNA R&S certification and a NSE4 Fortinet certification Wi-fi and security are a true passion of mine,  it is making a difference in people's life everywhere . in IOT, Location based apps, Retail, Automation and more. I built this course, for people like you, who are always looking and, Passionate to understand the key technologies used today.

View More...
ethical-hacking-and-penetration-testing

Ethical Hacking and Penetration Tes...

By : Darshil Modi

Lecture 21

implementing-configuring-cisco-routers-part-1

Implementing & Configuring Cisco Ro...

By : Dariusz Lipski

Lecture 10

learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Atef

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

Buy

$15

Enjoy Limitless Learning. Get Access to Unlimited Courses with Premium Subscrption Subscribe Now