Cryptography & Information Security: Complete Course

عدد الدروس : 68 عدد ساعات الدورة : 10:02:25 شهادة معتمدة : نعم التسجيل في الدورة للحصول على شهادة

للحصول على شهادة

  • 1- التسجيل
  • 2- مشاهدة الكورس كاملا
  • 3- متابعة نسبة اكتمال الكورس تدريجيا
  • 4- بعد الانتهاء تظهر الشهادة في الملف الشخصي الخاص بك
This course covers all aspects of cryptography, information security, and network security. Learn encryption techniques, symmetric and asymmetric key cryptography, block and stream ciphers, digital signatures, PKI, authentication protocols, SSL/TLS, wireless and mobile security, intrusion detection, and firewall concepts with practical examples and solved demonstrations.

قائمة الدروس

عن الدورة

This comprehensive Cryptography & Information Security course provides a deep dive into securing information and networks against modern cyber threats. The course starts with the fundamentals, covering the need for security, security principles, CIA triad, types of attacks (active and passive), security services, and mechanisms. Students learn network security models, essential terminologies, and encryption techniques including substitution and transposition, Caesar, Monoalphabetic, Polyalphabetic, Playfair, Hill, Vernam, Rail Fence, and Columnar Transposition ciphers.

Advanced topics include symmetric and asymmetric key cryptography with RSA, Diffie-Hellman, Elgamal, Knapsack algorithms, key distribution methods, and practical examples. Learners also explore block and stream ciphers, DES, AES, Blowfish, IDEA, RC4, and block cipher modes of operation (ECB, CBC, CFB, OFB, CTR).

Security tools such as message authentication codes, digital signatures, PKI, Kerberos, X.509 certificates, SSL/TLS, SSH, and secure email protocols (PGP, S/MIME) are included. The course also emphasizes wireless security, mobile security, intrusion detection systems, password management, viruses, worms, Trojan horses, and firewalls. Real-world examples, solved problems, and hands-on demonstrations help learners apply knowledge in cybersecurity roles effectively.