Cryptography
Explore various symmetric and asymmetric encryption algorithms. Discover the usage of hashing algorithms in everyday systems.
This module explains the importance of cryptography in the online world. It presents some of the building blocks of cryptographic algorithms and explains several symmetric and asymmetric encryption algorithms. It describes the role of hashing functions in today's systems and demonstrates different tools to crack hash values.
0%
Cryptography Basics
Learn the basics of cryptography and symmetric encryption.
0%
Public Key Cryptography Basics
Discover how public key ciphers such as RSA work and explore their role in applications such as SSH.
0%
Hashing Basics
Learn about hashing functions and their uses in password verification and file integrity checking.
0%
John the Ripper: The Basics
Learn how to use John the Ripper, a powerful and adaptable hash-cracking tool.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
