Encryption Academy for Beginners - Protect your data now!
$49.99
Shop on Udemy

Description

Welcome to the Encryption Academy for Beginners course. Encryption is an important part of cybersecurity because it can protect data from unauthorized access. COURSE LAUNCHED IN Juli 2023Beginners welcome: no need to know anything about Encryption! Encryption Academy for BeginnersThis complete academy consist of the following 4 courses: Introduction to EncryptionIn this course you will get an introduction to three important topics to better secure your data.  As Bonus: Password based Authentication and 2-Factor AuthenticationAs a bonus, I added the topics Password based Authentication and 2-Factor Authentication in this first course. When we digitally authenticate ourselves on the Internet, we usually use a password. In this course I show you the disadvantages of passwordbased authentication and how a second factor can improve the security of your access. In the practical exercise, I will show you the USB device YubiKey, which can be used for 2-factor authentication. But the Yubikey can do even more. I'll show you how to store your certificate with key material on it, for example, to digitally sign a PDF document in Adobe Acrobat. Hard- and SoftwareencryptionNowadays we store important data on our notebooks and often we use portable USB devices to transport data. What happens if you lose these devices? Encryption can protect you from others being able to use your data. I will give you a short introduction to what encryption means and how it works in general. In the practical exercises, I will show you how to use a few small tools to encrypt your data quickly and easily. Digital SignatureThe second big topic is digital signature. For example, when you send emails to your customers, how do they actually know that your emails are authentic? Any email format can be copied these days. In the SPAM folder we often get emails that look like they were sent by real companies but were created by hackers. How do your recipients know that your emails are really from you? In the course Introduction to Encryption you will learn how a digital signature works and how any data can be protected against manipulation. In the practical exercise I already show you in the first course how you can calculate hash values over any files. In this course I will also show you how to protect your PDF documents in Adobe Reader with a signed timestamp. With a timestamp you can have your document signed and thereby prove that your document existed at that time. I'll show you how to do that in this tutorial. Digital CertificateThe third major topic you will learn in this academy is called Digital Certificate. How can you actually protect your digital identity? When you sign your e-mails or documents, for example, you need a confirmed digital identity. Each of us has an ID card, which we use to authenticate ourselves in the analog world. In the digital world, we can legitimize ourselves with digital certificates. In the course Introdcution to Encryption I explain briefly how a digital certificate works. In the practical exercises I already show you how you can get a free digital certificate quickly and easily. This certificate is only for testing purposes. But you will already learn what is actually contained in it. You should already understand what information about you is secured. Additionally, I will show you how to sign a PDF document in Adobe Acrobat with this certificate.------------------InstructorI'm Mike Kurtze, an engineer from Germany and a senior software developer in the area of encryption since 2005. With my Encryption Academy for Beginners I want to show you with my knowledge and experience how encryption works and which tools you can use to protect your sensitive data.-----------------This course also comes with: Lifetime access to all future updatesA responsive instructor in the Q & A SectionUdemy Certificate of Completion Ready for DownloadA 30 Day No Questions Asked Money Back Guarantee! Join me in this course if you want to learn how encryption works and and which tools you can use to protect your sensitive data.

logo

Udemy