• Online, Self-Paced
Course Description

This Course Focus is on Symmetric Encryption and hash functions ,we will understand the inner parts, while still making the learning curve fun and simple

We will look at secret key generation, how do we generate keys , it is much more complex than you thought

it involves permutations of the bit stream , swapping bits , shifting, substitution them and finally doing the XOR bitwise operation

You will learn the basic of modern encryption operations

We will dive into block ciphers mode of operation , how algorithms join the block ciphers together and send them along , a key concept of every symmetric encryption.

And then we will learn of hash functions

Hash functions are calculated to keep our messages intact.
How do we keep the integrity and authenticity of our files using salted hash and MAC's- Message Authentication Codes and hmacs, a cryptographic hash functions
Basic knowledge
Lots of motivation, security for the unknown, computer skills

Learning Objectives

Understand How encryption works , how cipher algorithm operate , how secret keys are generated

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.