What you'll learn:
- fully Understand the concepts of encryption algorithm's, hands on. create symmetric and asymmetric keys, generate certificates, apply hash functions
OpenSSL and Cryptography - Beginners Guide
A complete Guide
That will walk you through the secrets of:
Encryption, symmetric keys, ciphers, digital signatures using openSSL
What students wrote
Nick Camus
"Great teacher, alive, and communicative."
Atela Dondth
"Ofer is so knowledgeable and experienced. I really enjoyed learning from him."
Lisa Mind
"Awesome course! The instructor really goes indepth on every concept!"
Hana rebic
"I absolutely loved this course. It taught me everything I needed know about cryptography."
Tereza Alex
Thanks for a great and easy to understand course ofer.
Fred Barbosa
I've not done much in the way of cryptography for many years because of the jobs that I've held not requiring it. I've begun exploring and revisiting some things to freshen up my experience and understanding. This was a great way to revisit with good detailed explanations in the step by step clips that were offered. Great for beginners or just an overall refresher.
This course isHands On. I will teach you the theory and the practical usage.
You will understand how HTTPS works with public key cryptography and how to use Hash functions to keep your files integrity safe
WHY openSSL cryptography ?
Cryptography is everywhere, if you are an ethical hacker, Developer, an IT manager or anyone who hangs around with technology, than this is the stuff that you deal with everyday
In this course you will learn to generate symmetric keys , public keys, certificate request, hash functions and more
You will understand the theoretical concepts of encryption using public and private keys , and use the power of openSSL to apply them
This course is HANDS ON . no power points or fancy words .
WHAT WILL YOU LEARN
how encryption works
when do we use encryption
cipher algorithm operations
what are symmetric keys
generate and apply symmetric keys on openSSL
hash functions
when do we use hash functions for integrity and when for confidentiality
hash different files on your computers
public key cryptography
the theory beyond public and private key
digital signatures
create your own certificate signing request
crate your own self sign request
TARGET AUDIENCE
Students who have little or no experience in cryptography, and are curious to finally understand the mysterious concepts
Anyone who is interested in encryption and hashing techniques , wants to understand and learn how to apply them
Ethical hackers, web developers and developers who wants to extend their knowledge on cryptography