Home Search Profile

Master Symmetric Cryptography: AES & DES Expert Guide

Focused View

2:09:56

  • 01 - Cryptography is everywhere.mp4
    00:41
  • 02 - Basic terminology.mp4
    02:11
  • 03 - Intro to Codespaces.mp4
    01:46
  • 01 - Cryptographys role.mp4
    03:26
  • 02 - Kerckhoffss principle.mp4
    03:47
  • 03 - Symmetric keys.mp4
    03:23
  • 04 - Block vs. stream ciphers.mp4
    03:37
  • 05 - Cryptographic hash algorithms.mp4
    03:27
  • 06 - Challenge Building a hash algorithm.mp4
    02:54
  • 07 - Solution Building a hash algorithm.mp4
    02:08
  • 01 - Binary representation.mp4
    03:12
  • 02 - Characters.mp4
    04:06
  • 03 - Integers.mp4
    03:55
  • 04 - Floating point numbers.mp4
    03:56
  • 05 - Boolean operations.mp4
    03:52
  • 06 - Padding.mp4
    03:29
  • 07 - Challenge QR code printer.mp4
    02:43
  • 08 - Solution QR code printer.mp4
    01:53
  • 01 - Simple substitution ciphers.mp4
    04:48
  • 02 - Polyalphabetic substitution ciphers.mp4
    06:28
  • 03 - Permutation and transposition ciphers.mp4
    02:50
  • 04 - Simple one-time pads with XOR.mp4
    03:06
  • 05 - S-boxes and P-boxes.mp4
    01:49
  • 06 - Feistel networks.mp4
    02:30
  • 07 - Linear-feedback shift registers (LFSRs).mp4
    02:42
  • 08 - Challenge Software-based LFSR.mp4
    01:15
  • 09 - Solution Software-based LFSR.mp4
    00:56
  • 01 - The Data Encryption Standard (DES).mp4
    03:34
  • 02 - The Advanced Encryption Standard (AES).mp4
    03:44
  • 03 - AES and DES in practice.mp4
    04:49
  • 04 - The RC4 stream cipher.mp4
    02:03
  • 05 - Challenge Encrypting, decrypting, and hashing with OpenSSL.mp4
    02:17
  • 06 - Solution Encrypting, decrypting, and hashing with OpenSSL.mp4
    02:34
  • 01 - Introduction to block cipher modes.mp4
    02:51
  • 02 - Cipher block chaining (CBC).mp4
    01:51
  • 03 - CFB Cipher feedback.mp4
    01:10
  • 04 - OFB Output feedback.mp4
    01:25
  • 05 - CTR Counter mode.mp4
    01:03
  • 06 - Challenge Building a block cipher with CBC mode.mp4
    02:14
  • 07 - Solution Building a block cipher with CBC mode.mp4
    01:03
  • 01 - Exchanging keys.mp4
    01:34
  • 02 - Key length and large numbers.mp4
    04:26
  • 03 - The importance of randomness to cryptography.mp4
    02:26
  • 04 - Modular arithmetic.mp4
    02:46
  • 05 - DiffieHellman key exchange.mp4
    02:29
  • 06 - Challenge Implementing DiffieHellman.mp4
    02:05
  • 07 - Solution Implementing DiffieHellman.mp4
    01:17
  • 01 - Next steps.mp4
    01:25
  • More details


    Course Overview

    This comprehensive course delivers practical knowledge of symmetric cryptography, the fundamental method for securing data with single-key encryption. Learn high-level concepts, algorithms, and modern techniques used in data protection across IT systems.

    What You'll Learn

    • Core principles of symmetric vs. asymmetric cryptography
    • Essential algorithms like AES, DES, and RC4
    • Block cipher modes including CBC, CFB, and CTR

    Who This Is For

    • IT professionals implementing data security
    • Developers working with encryption systems
    • Tech students mastering cryptographic concepts

    Key Benefits

    • Understand industry-standard encryption methods
    • Gain hands-on experience with OpenSSL tools
    • Learn to secure large datasets efficiently

    Curriculum Highlights

    1. Symmetric Cryptography Fundamentals
    2. Binary Data Representation
    3. Advanced Encryption Standards (AES/DES)
    Focused display
    Category
    • language english
    • Training sessions 48
    • duration 2:09:56
    • English subtitles has
    • Release Date 2025/06/02