📄️ Cryptography Basics
Securing information through encoding
📄️ Code versus Ciphers
Algorithm for encrypting and decrypting information
📄️ Choosing Encryption Algorithms
The perfect encryption algorithm
📄️ Symmetric Encryption
Using the same key
📄️ Asymmetric Encryption
Using a pair of keys
📄️ Escrow, Recovery, and Stretching
Ways to store, recover, and secure keys
📄️ Hashing
Converting data into fixed-size value using a function
📄️ Common Hashing Attacks
Common Hashing Attacks
📄️ Encryption Tools
Securing data through various methods
📄️ Tor Browser
The Onion Router
📄️ Blockchain
A distributed ledger technology
📄️ Public Key Infrastructure
Using asymmetrical key pairs
📄️ Digital Certificate Types
Types of digital certificates for enterprise
📄️ Certificate Revocation
Verifying and Invalidating