Free Course:

Foundations of Cryptography

This introductory course covers key information around cryptography, Public Key Infrastructure (PKI) and Transport Layer Security (TLS) needed to be successful in today’s IT career. It will cover key terms and concepts, types of ciphers, how the ciphers are used, and how public key infrastructure keeps our information safe.

About This Course

Key components of the course include:

  • Explain the importance of cryptography in keeping our information secure
  • Explain ways we use cryptography to keep our information secure
  • Define key cybersecurity terms and concepts
  • Explain the role of a key and the importance of key length
  • Describe hashing and how it’s used
  • Explain how salt, pepper, and key-stretching can make storing passwords and other data more secure
  • Explain what symmetric encryption is and how it’s used
  • Explain what Public-Key cryptography is and how it’s used
  • List types of cryptography attacks
  • Explain how Public Key Infrastructure (PKI) keeps our data safe
  • Describe types of trust models
  • Explain key PKI terms
  • Describe what a digital certificate is and how it’s used
  • Explain the need for revoking certificates and list methods of revoking certificates
  • Explain the purpose of Transport Layer Security (TLS)
  • Explaining the TLS Record and TLS Handshake protocols
  • Explain the TLS process

Explore the Mysteries of Cryptography and Public Key Infrastructure

  • Master Needed Cryptography, Public Key Infrastructure (PKI) and Transport Layer Security (TLS) Knowledge and Skills for IT Certification Tests
  • Learn Foundational Knowledge to Accelerate Network and IT Training
  • Accelerate Your IT Career

Learn it Right, Learn it Well, and Reap the Rewards

Spending the time now to fully understand the core information of cryptography principles will help create a strong foundation to build off of.

Module Descriptions:

Welcome and Getting Started: Prepare yourself for efficiently and successfully completing the course. You’ll get an overview of what the course is all about and what you should expect out of it.

Why Cryptography: we’ll explore ways cryptography is applied. This short module gives some context for how we use cryptography.

Cryptography: Participants will delve into the principles of cryptography, learning about encryption algorithms, key management, and types of ciphers, and how cryptographic techniques are used to secure data transmission and storage.

Public Key Infrastructure (PKI): Participants will gain an understanding of PKI concepts and processes, including certificate issuance, revocation, and management, and how PKI facilitates secure communication through the use of digital certificates and public-private key pairs.

Transport Layer Security (TLS): Next we’ll explore how cryptographic and PKI are used to secure communications through the TLS protocol. TLS is used for much of our internet traffic.

Applied Cryptography: This module will give examples of how we use ciphers, PKI, and TLS to secure our communication and talk about specific use cases, like digital signatures and code signing. We’ll also get into some vulnerabilities in cryptography that we must be aware of when implementing cryptography.

Wrap Up: Time to wrap up the course and provide any final thoughts.

How to Take This Course!

Option #1 – Watch this course on YouTube. For convenience, I’ve included links to the videos down below

Option #2 – Take this course on Udemy. This is not a free option, but has the advantage of a full learning management system, no commercials, and completion certificates.

Here’s the link to the Udemy Course:

https://www.udemy.com/course/foundations-of-cryptography-by-techknowsurge/?referralCode=8C9793C82660DE3DB566

 

Course Content

Module 0 – Welcome and Getting Started

Welcome https://youtu.be/EeFMGgGbvEs 0:01:13
Course Overview https://youtu.be/dCVwT1YaKwA 0:03:52
Syllabus N/A
Meet Your Instructor N/A

 

Module 1 – Why Cryptography

Module Intro https://youtu.be/nk790jFEyeA 0:01:01
The 5 Pillars of Information Security https://youtu.be/EaNxgiQrvAg 0:04:58
Encrypting Data https://youtu.be/9GwmIYsP97M 0:03:30
PKI and Digital Certificates https://youtu.be/kfN3PPyof6s 0:09:26

 

Module 2 – Cryptography

Module Intro https://youtu.be/XCNKLiB-1hI 0:01:45
What is Cryptography https://youtu.be/CO3of5N11xQ 0:08:18
Cryptography Keys https://youtu.be/TGGUTjp0gzE 0:09:00
Modern Cryptography https://youtu.be/smYqwCBxJ44 0:07:24
Hashing https://youtu.be/JYt_LKTJJi4 0:06:58
DEMO: Hashing in Windows https://youtu.be/VInljOVE4io 0:05:44
Salt, Pepper, Key-Stretching https://youtu.be/j9fgiadeKcE 0:08:57
Symmetric and Asymmetric Encryption https://youtu.be/iyGY3QcmsRo 0:04:33
Symmetric Encryption https://youtu.be/Y_mcRfc8e9I 0:10:28
Public-Key Cryptography https://youtu.be/o3VRwxQTfiw 0:11:18

 

Module 3 – Public Key Infrastructure (PKI)

Module Intro https://youtu.be/hH25ysJ1SpM 0:02:01
Public Key Infrastructure (PKI) https://youtu.be/tCZ_RM-Yn38 0:16:33
Trust Models https://youtu.be/C8B9zt5ytIQ 0:06:58
Certificate Hierarchy https://youtu.be/6NuM0dqYKso 0:06:14
DEMO: Digital Certificates https://youtu.be/cwdrypQAWV8 0:05:28
Digital Certificates https://youtu.be/OxK7DstdDkg 0:11:28
Revoking Certificates https://youtu.be/baJ2QJjcD0s 0:05:32

 

Module 4 – Transport Layer Security (TLS)

Module Intro https://youtu.be/19L4TY8H-wc 0:01:48
Transport Layer Security (TLS) https://youtu.be/XTW3h0u64Ks 0:08:56
TLS Record Protocol https://youtu.be/KdxrFHbApu8 0:06:54
Cipher Suites https://youtu.be/WGjNpUrPYV0 0:05:24
TLS Handshake Protocol https://youtu.be/yBvlq9GJKgc 0:12:27

 

Module 5 – Applied Cryptography

Module Intro https://youtu.be/tsord5Tvk8k 0:01:43
Applied Cryptography https://youtu.be/K7QeJbnEvUQ 0:05:23
Digital Signatures https://youtu.be/Z9VtrvCT0NY 0:04:36
Code Signing https://youtu.be/na8q5S2l0tk 0:07:42
Blockchain https://youtu.be/CvNdK-MCjV4 0:07:03
Key Escrow https://youtu.be/pdgzPqE1T-k 0:05:10
Cryptographic Attacks https://youtu.be/GZt6GmVv7mg 0:06:17

 

Module X – Wrap Up

Review https://youtu.be/Sm_4ryh8YOE 0:03:22
Course Wrap Up https://youtu.be/ze1VSTWAH5o 0:02:24

 

Help the Effort

Creating these videos takes a lot of time, effort, and money. There are costs to producing the videos, hosting the site, and buying the equipment, not to mention the 1,000’s of hours I’ve put into recording these videos. So far, I’ve asked for and received very little in return. Please consider helping keep the effort going by one of the following: