Overview of cryptography [CISMP]
The course is part of this learning path
Introduction to cryptography
Cryptography has been around for a long time.
Alan Turing’s accomplishment during World War II in decoding the German Enigma cipher is often referred to as the greatest milestone in the history of cryptography. Cracking Enigma seemed an impossible task, however Turing built a device known as the Bombe that used logic to decipher the encrypted messages produced by Enigma. From mid-1940, German Air Force signals were being read and the intelligence gained from them helped the war effort.
Today, cryptography is at the heart of the worldwide communication network. WhatsApp, for example, uses end-to-end encryption to secure your messages, so that only you and the person you’re communicating with can read or listen to what is sent.
This Learning Path will give you a basic understanding of what cryptography is and how it works through symmetric ciphers, hash functions, asymmetric ciphers, and digital signatures.
You’ll also look at key exchange and management, different models of protection, and cryptanalysis
This course will begin with a brief history of cryptography, followed by an introduction into some of the security controls that rely on cryptography to this day. You will also be introduced to the four primary areas of cryptography, comprised of cipher algorithms and keys.
A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.