Course Overview

Attacks on organizations have been growing rapidly in recent years, with high-profile breaches being disclosed in all sectors of business, potentially leading to the theft of private information, financial losses, hefty fines, and reputational damage for the organizations that fall victim to them. The outlook on these attacks and breaches has slowly shifted from being an "if" scenario to a "when" scenario, as it is nearly impossible to cover every vulnerability, especially with new vulnerabilities being discovered by attackers every day.

A strong cybersecurity posture requires a combination of multiple domains, with cryptography being one of the most critical - yet often overlooked or underused - of the bunch. Cryptography can be used preventatively, but it can also be used to secure your data even if a breach occurs and the data is exfiltrated. This course will cover in depth the two main branches of cryptography - symmetric and asymmetric, as well as hashing and steganography, and how to implement these using free libraries available in Python. Live coding exercises that you can follow along with will show you exactly how you can accomplish this, and all of this will be accompanied by in-depth explanations for you to fully understand the topic at hand.

This course is focused on helping you fully appreciate the need for robust cryptographic security and the best practices and standards to meet the goal of securing your applications and protecting your user’s private information.

What You Will Learn

  • Understand the importance of cryptography and the place it has within every organization
  • Familiarize with the differences between symmetric encryption
  • asymmetric encryption
  • hashing
  • steganography and when
  • where and why to use them
  • Understand the modern ciphers and hash functions in use today by organizations and security practitioners
  • Learn about threats posed from a weak cryptographic posture
  • Familiarize with the practical steps necessary to protect your applications and your users private information

Program Curriculum

  • Brief History of Cryptography
  • The Importance of Cryptography in the Modern Age
  • $7 Million Cybersecurity Scholarship by EC-Council

  • Installing Python
  • Installing Visual Studio Code
  • Setting up your Project
  • Python Refresher
  • Chapter 2 Lab
  • Chapter 2 Quiz

  • Introduction to Symmetric Cryptography
  • The Caesar Cipher
  • The Vigenère Cipher
  • Data Encryption Standard (DES & 3DES)
  • Advanced Encryption Standard (AES)
  • Chapter 3 Lab
  • Chapter 3 Quiz

  • Introduction to Hashing
  • Password Hashing
  • Rainbow Tables
  • Salting & Peppering
  • Data Integrity & Checksums
  • Chapter 4 Lab
  • Chapter 4 Quiz

  • Introduction to Asymmetric Cryptography
  • Diffie-Hellman Key Exchange
  • Rivest-Shamir-Adleman (RSA)
  • MACs & Digital Signatures
  • Elliptic Curve Cryptography (ECC)
  • Chapter 5 Lab
  • Chapter 5 Quiz

  • Introduction to Steganography & Obfuscation
  • Image-based Steganography
  • Chapter 6 Lab
  • Chapter 6 Quiz

  • Overview of Key Takeaways from the Course
  • Final Wrap Up
Load more modules

Instructor

Christopher OMarra

Christopher O'Marra has experience in both the private and public sectors at some of the largest organizations in Canada as a certificate and key management strategist which involves planning, building, and deploying both certificate lifecycle management (CLM) solutions and public key infrastructures (PKIs), as well as configuring, maintaining and managing hardware security modules (HSMs) for key management. He has also developed in Python and other programming and scripting languages for many years automating processes, developing desktop and mobile applications, and at one point developing machine learning algorithms for small to medium-sized organizations. He knows that cryptography can at first appear as an overwhelming and complex topic but takes joy in being able to break it down in an engaging way so that others such as yourself can understand and grasp the topics being discussed. Chris is fascinated by all things cryptography and wants to share his knowledge in a rapidly growing domain so that others can benefit from it, and so they can be prepared for the future in a post-quantum world.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8