You’ll master the foundational skills necessary to become a successful Security Engineer. This program will focus on how to protect a company’s computer systems, networks, applications and infrastructure from security threats or attacks.
Security and cryptography is a premise in any application on the internet today. For obvious reasons:
You need to protect data that you don't want anyone else to have access to.
The internet by itself is open and anyone can eavesdrop your personal information.
...and you need to protect yourself against the possibility of simple breaches.
Why learn Security and Cryptography by programming with Python?
Cryptography is understood easiest by trying the mistakes yourself - no complex theory needed.
No high-level mathematical skill are needed with this easy approach to learn it.
Learn the security principles by programming examples to fully appreciate it.
You get to try fun stuff like breaking wrong use of ciphers and cracking your own password from a laptop.
How will you benefit from this course?
You will understand security and the principle of cryptography and cryptographic algorithms.
Avoid making security mistakes commonly with cryptographic algorithms.
Understand the full TLS/SSL stack.
Implemented and used One Time Pads, Stream Ciphers, Block Ciphers, Key Exchange, Public Key Encryption, Hash functions, Digital Signatures, HMAC, Shadow files and more.
Know how to use crypto-libraries properly without making mistakes.
Tried all bigger mistakes in cryptography and security.
Crack passwords from Shadow Files
If you want to become a comfortable about encryption and security you need to have some basic understanding of the underlying security concepts. Understanding the main mistakes will enable you to implement and cryptographic algorithms in a correct manner.
In this course we will cover all concepts and security concepts in cryptography to understand the full TLS/SSL protocol stack, how password validation is done and more. You will be learning along the way and implement the encryption and authentication algorithms along the way, making some mistakes to fully appreciate and understand the security flaws.