4.5  981 reviews on Udemy

TOTAL: Conversation on Cryptography: w/ Mike Meyers

Diving into cryptography with The Alpha Geek and Total Seminars team. Learn cyber security and ethical hacking.
Course from Udemy
 3403 students enrolled
 en
Define cryptography and the key role it plays in protecting our digital data.
Learn how hashing helps us to be certain the data we receive or download is legitimate.
Find out how Web sites use certificates to make sure our usernames, passwords, credit card numbers, and other personal data stay secure.
Prepare for the CompTIA Security+ exam by better understanding cryptography and PKI, one of the six exam domains.
Understand ciphers, binary, hashing, symmetric and asymmetric cryptosystems, digital signatures and certificates, and public key infrastructure.

Hey there! Mike Meyers, your favorite nerd, here to present a fun, casual, and informative conversation on cryptography. I partnered with my good friend, Bill Saichek, to talk about one of my very favorite topics: cryptography. I've loved the idea of cryptic codes, secret agents, and deciphering hidden text since I was a kid. And because I've had so many questions on this topic, I decided to try a different kind of course to help my students understand the more complex concepts in cryptography.

This Conversation on Cryptography course was designed with YOU in mind, whether you're just curious about cryptography (like me), or you took my CompTIA Security+ (SY0-501): The Total Course (or any other cyber security course) and would like a better understanding of this intriguing subject. Here's a rundown of what Bill and I talk about:

  • Caesar and Vigenere ciphers - These fascinating ciphers form part of the basic foundation of cryptography, back before the digital age when militaries, powerful leaders, and spies had to pass messages that couldn't be deciphered if they fell into enemy hands.


  • Binary - In order for ciphers to be useful today, cryptographers had to figure out how to translate them into the language of computers (1s and 0s).


  • Hashing - If all our digital data are just strings of 1s and 0s, how can we make sure we have the real deal? Learn about authentication in this episode.


  • Asymmetric cryptography - We discuss how generating a key pair offers more security, though at the price of taking more time.


  • Symmetric cryptography - This quick and dirty cryptosystem uses a single key to both encrypt and decrypt.


  • Asymmetric methods - Dig into how these methods actually work, and how prime numbers are keeping your data safe. Did we

  • mention we play with paint in this episode?


  • Certificates - The Web is full of hackers who want to take advantage of your personal and private information. So, who do we trust? That's where certificates come in.


  • Public key infrastructure - How do we pass out those certificates? And assure the authenticity of them? PKI to the rescue!


  • Living with certificates - We get our hands on some of those certificates and teach you how to troubleshoot them when something goes wrong.

So sit down, grab a cup of coffee, and join Bill & I for a conversation on cryptography.

TOTAL: Conversation on Cryptography: w/ Mike Meyers
$ 49.99
per course
Also check at

FAQs About "TOTAL: Conversation on Cryptography: w/ Mike Meyers"

About

Elektev is on a mission to organize educational content on the Internet and make it easily accessible. Elektev provides users with online course details, reviews and prices on courses aggregated from multiple online education providers.
DISCLOSURE: This page may contain affiliate links, meaning when you click the links and make a purchase, we receive a commission.

SOCIAL NETWORK