Certification Prep
Premium Module
Beginner
Module 3 of 8

Basic Cryptography

Master the fundamental concepts of cryptography that protect digital information

Basic Cryptography
Premium

Master the fundamental concepts of cryptography. Learn about symmetric and asymmetric encryption, hash functions, digital signatures, key management, PKI, blockchain technology, and cryptographic obfuscation techniques that form the backbone of modern cybersecurity.

This comprehensive module contains 6 lessons covering essential cryptographic concepts that protect all digital information and communications.

Premium Module Benefits:

  • • Full access to all 6 comprehensive cryptography lessons
  • • Interactive encryption and hashing demonstrations
  • • PKI certificate chain visualization tools
  • • Hands-on blockchain and steganography exercises
  • • Progress tracking and completion certificates
  • • Part of the complete Security+ preparation track
6
Lessons
170 min
Duration
Premium
Access
10
Points

What You'll Learn

By the end of this module, you'll have mastered the cryptographic fundamentals that protect all digital information and communications.

Understand the fundamental principles of cryptography including symmetric and asymmetric encryption, hash functions, and digital signatures
Learn how to manage cryptographic keys and key management processes in enterprise environments
Explore the role of cryptography in securing data at rest, in transit, and in use across different systems
Master Public Key Infrastructure (PKI) concepts including certificate authorities, trust hierarchies, and certificate lifecycle management
Understand how blockchain technology uses cryptographic principles to create tamper-resistant distributed ledgers
Apply cryptographic obfuscation techniques like steganography to hide sensitive information within normal data

Module Lessons

This module contains the following lessons:

1
Public Key Infrastructure
30 min
Lesson

Learn about the public key infrastructure (PKI) and how it enables secure communications and identity verification through digital certificates, certificate authorities, and trust hierarchies.

PKI Components
Certificate Authorities
Trust Hierarchies
Certificate Lifecycle
Root vs Intermediate CAs
Certificate Validation
2
Encryption and Hashing
40 min
Lesson

Learn about encryption and hashing techniques, including symmetric and asymmetric encryption, hash functions, digital signatures, and their real-world applications in cybersecurity.

Symmetric Encryption
Asymmetric Encryption
Hash Functions
Digital Signatures
Key Exchange
Encryption Standards
3
Cryptographic Tools
20 min
Lesson

Understand the role of cryptographic tools in securing data, including encryption software, key management systems, and hardware security modules used in enterprise environments.

Encryption Software
Key Management
Hardware Security Modules
Cryptographic APIs
Security Libraries
Implementation Best Practices
4
Cryptographic Obfuscation
20 min
Lesson

Learn about cryptographic obfuscation techniques that make it difficult for attackers to understand the purpose or contents of data, including steganography and data hiding methods.

Steganography
Data Hiding
Obfuscation Techniques
Covert Channels
Information Hiding
Detection Methods
5
How Blockchain Works
20 min
Lesson

Learn about the decentralized nature of blockchain technology and how it uses cryptographic principles to enable secure, transparent transactions without intermediaries.

Blockchain Fundamentals
Cryptographic Hashing
Distributed Consensus
Mining Process
Smart Contracts
Decentralization
6
Certificates in Cryptography
40 min
Lesson

Learn how digital certificates enable secure communications and identity verification through standardized formats, trust models, certificate authorities, and revocation mechanisms.

Digital Certificates
X.509 Standard
Certificate Fields
Certificate Revocation
OCSP
Certificate Pinning

Perfect For

Cryptography Beginners

New to cryptography who need to understand how encryption, hashing, and digital signatures protect digital information.

IT Security Professionals

IT professionals who need to understand cryptographic implementations, PKI infrastructure, and key management best practices.

Security+ Students

Anyone preparing for the Security+ exam who needs to master cryptographic concepts that are heavily tested on the certification.