About this course
No matter what your role, if you work with computers, you use cryptography on a daily basis. Symmetric cryptography is a common method that uses the same keys for encryption and decryption of data. Faster and less resource intensive than asymmetric cryptography, symmetric cryptography is important for all IT professionals—software developers, system architects, and security engineers alike—to understand. This course delivers a practical overview of the technology, with an emphasis on high-level concepts that affect how our data is stored and transmitted. Instructor Jeremy Hansen explains the difference between single-key (symmetric) and multiple-key (asymmetric) algorithms, and shows how symmetric encryption affects underlying binary data.
Learn about the basic ciphers used in symmetric cryptography, including substitution, permutation, and transposition, as well as influential symmetric-key algorithms such as the Advanced Encryption Standard and its predecessor, the Data Encryption Standard. Finally, you will review modern block cipher modes, such as cipher block chaining (CBC), cipher feedback (CFB), output feedback (OFB), and counter (CTR), which can help authenticate large amounts of data.
Offered by: LinkedIn Learning
Offered to: Students
Cost: No cost
Time requirement: 1.5 hours