Free Course:
Foundations of Cryptography
This introductory course covers key information around cryptography, Public Key Infrastructure (PKI) and Transport Layer Security (TLS) needed to be successful in today’s IT career. It will cover key terms and concepts, types of ciphers, how the ciphers are used, and how public key infrastructure keeps our information safe.
About This Course
Key components of the course include:
- Explain the importance of cryptography in keeping our information secure
- Explain ways we use cryptography to keep our information secure
- Define key cybersecurity terms and concepts
- Explain the role of a key and the importance of key length
- Describe hashing and how it’s used
- Explain how salt, pepper, and key-stretching can make storing passwords and other data more secure
- Explain what symmetric encryption is and how it’s used
- Explain what Public-Key cryptography is and how it’s used
- List types of cryptography attacks
- Explain how Public Key Infrastructure (PKI) keeps our data safe
- Describe types of trust models
- Explain key PKI terms
- Describe what a digital certificate is and how it’s used
- Explain the need for revoking certificates and list methods of revoking certificates
- Explain the purpose of Transport Layer Security (TLS)
- Explaining the TLS Record and TLS Handshake protocols
- Explain the TLS process
Explore the Mysteries of Cryptography and Public Key Infrastructure
- Master Needed Cryptography, Public Key Infrastructure (PKI) and Transport Layer Security (TLS) Knowledge and Skills for IT Certification Tests
- Learn Foundational Knowledge to Accelerate Network and IT Training
- Accelerate Your IT Career
Learn it Right, Learn it Well, and Reap the Rewards
Spending the time now to fully understand the core information of cryptography principles will help create a strong foundation to build off of.
Module Descriptions:
Welcome and Getting Started: Prepare yourself for efficiently and successfully completing the course. You’ll get an overview of what the course is all about and what you should expect out of it.
Why Cryptography: we’ll explore ways cryptography is applied. This short module gives some context for how we use cryptography.
Cryptography: Participants will delve into the principles of cryptography, learning about encryption algorithms, key management, and types of ciphers, and how cryptographic techniques are used to secure data transmission and storage.
Public Key Infrastructure (PKI): Participants will gain an understanding of PKI concepts and processes, including certificate issuance, revocation, and management, and how PKI facilitates secure communication through the use of digital certificates and public-private key pairs.
Transport Layer Security (TLS): Next we’ll explore how cryptographic and PKI are used to secure communications through the TLS protocol. TLS is used for much of our internet traffic.
Applied Cryptography: This module will give examples of how we use ciphers, PKI, and TLS to secure our communication and talk about specific use cases, like digital signatures and code signing. We’ll also get into some vulnerabilities in cryptography that we must be aware of when implementing cryptography.
Wrap Up: Time to wrap up the course and provide any final thoughts.
How to Take This Course!
Option #1 – Watch this course on YouTube. For convenience, I’ve included links to the videos down below
Option #2 – Take this course on Udemy. This is not a free option, but has the advantage of a full learning management system, no commercials, and completion certificates.
Here’s the link to the Udemy Course:
Course Content
Module 0 – Welcome and Getting Started
Welcome | https://youtu.be/EeFMGgGbvEs | 0:01:13 |
Course Overview | https://youtu.be/dCVwT1YaKwA | 0:03:52 |
Syllabus | N/A | |
Meet Your Instructor | N/A |
Module 1 – Why Cryptography
Module Intro | https://youtu.be/nk790jFEyeA | 0:01:01 |
The 5 Pillars of Information Security | https://youtu.be/EaNxgiQrvAg | 0:04:58 |
Encrypting Data | https://youtu.be/9GwmIYsP97M | 0:03:30 |
PKI and Digital Certificates | https://youtu.be/kfN3PPyof6s | 0:09:26 |
Module 2 – Cryptography
Module Intro | https://youtu.be/XCNKLiB-1hI | 0:01:45 |
What is Cryptography | https://youtu.be/CO3of5N11xQ | 0:08:18 |
Cryptography Keys | https://youtu.be/TGGUTjp0gzE | 0:09:00 |
Modern Cryptography | https://youtu.be/smYqwCBxJ44 | 0:07:24 |
Hashing | https://youtu.be/JYt_LKTJJi4 | 0:06:58 |
DEMO: Hashing in Windows | https://youtu.be/VInljOVE4io | 0:05:44 |
Salt, Pepper, Key-Stretching | https://youtu.be/j9fgiadeKcE | 0:08:57 |
Symmetric and Asymmetric Encryption | https://youtu.be/iyGY3QcmsRo | 0:04:33 |
Symmetric Encryption | https://youtu.be/Y_mcRfc8e9I | 0:10:28 |
Public-Key Cryptography | https://youtu.be/o3VRwxQTfiw | 0:11:18 |
Module 3 – Public Key Infrastructure (PKI)
Module Intro | https://youtu.be/hH25ysJ1SpM | 0:02:01 |
Public Key Infrastructure (PKI) | https://youtu.be/tCZ_RM-Yn38 | 0:16:33 |
Trust Models | https://youtu.be/C8B9zt5ytIQ | 0:06:58 |
Certificate Hierarchy | https://youtu.be/6NuM0dqYKso | 0:06:14 |
DEMO: Digital Certificates | https://youtu.be/cwdrypQAWV8 | 0:05:28 |
Digital Certificates | https://youtu.be/OxK7DstdDkg | 0:11:28 |
Revoking Certificates | https://youtu.be/baJ2QJjcD0s | 0:05:32 |
Module 4 – Transport Layer Security (TLS)
Module Intro | https://youtu.be/19L4TY8H-wc | 0:01:48 |
Transport Layer Security (TLS) | https://youtu.be/XTW3h0u64Ks | 0:08:56 |
TLS Record Protocol | https://youtu.be/KdxrFHbApu8 | 0:06:54 |
Cipher Suites | https://youtu.be/WGjNpUrPYV0 | 0:05:24 |
TLS Handshake Protocol | https://youtu.be/yBvlq9GJKgc | 0:12:27 |
Module 5 – Applied Cryptography
Module Intro | https://youtu.be/tsord5Tvk8k | 0:01:43 |
Applied Cryptography | https://youtu.be/K7QeJbnEvUQ | 0:05:23 |
Digital Signatures | https://youtu.be/Z9VtrvCT0NY | 0:04:36 |
Code Signing | https://youtu.be/na8q5S2l0tk | 0:07:42 |
Blockchain | https://youtu.be/CvNdK-MCjV4 | 0:07:03 |
Key Escrow | https://youtu.be/pdgzPqE1T-k | 0:05:10 |
Cryptographic Attacks | https://youtu.be/GZt6GmVv7mg | 0:06:17 |
Module X – Wrap Up
Review | https://youtu.be/Sm_4ryh8YOE | 0:03:22 |
Course Wrap Up | https://youtu.be/ze1VSTWAH5o | 0:02:24 |
Help the Effort
Creating these videos takes a lot of time, effort, and money. There are costs to producing the videos, hosting the site, and buying the equipment, not to mention the 1,000’s of hours I’ve put into recording these videos. So far, I’ve asked for and received very little in return. Please consider helping keep the effort going by one of the following:
- Donate to the cause: buymeacoffee.com/techknowsurge
- Buy TechKnowSurge merch: techknowsurge.myspreadshop.com/
- Like and comment on any YouTube videos you watch
- Subscribe to my channel: youtube.com/@TechKnowSurge
- Let me know if there is any issues with my content, just send me an email: feedback@techknowsurge.com
- Purchase a class on Udemy and leave me a review: www.udemy.com/user/techknowsurge/
- Subscribe to the TechKnowSurge newsletter: techknowsurge.com/newsletter-signup/
- Follow me on social media
- Facebook: www.facebook.com/TechKnowSurge
- Twitter: twitter.com/TechKnowSurge
- Instagram: www.instagram.com/techknowsurge
- LinkedIn: www.linkedin.com/company/techknowsurge
- Tell your others about TechKnowSurge
- Share content links to others
- Repost content on social media
- Tell classmates about what videos helped you