Cryptography Basics
Securing information through encoding
Code versus Ciphers
Algorithm for encrypting and decrypting information
Choosing Encryption Algorithms
The perfect encryption algorithm
Symmetric Encryption
Using the same key
Asymmetric Encryption
Using a pair of keys
Escrow, Recovery, and Stretching
Ways to store, recover, and secure keys
Hashing
Converting data into fixed-size value using a function
Common Hashing Attacks
Common Hashing Attacks
Encryption Tools
Securing data through various methods
Tor Browser
The Onion Router
Blockchain
A distributed ledger technology
Public Key Infrastructure
Using asymmetrical key pairs
Digital Certificate Types
Types of digital certificates for enterprise
Certificate Revocation
Verifying and Invalidating