Modern Cryptography for Cybersecurity Professionals

In today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.
The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. You'll then delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN).
By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption and hashed are used, and recognized the importance of key management and the PKI.

Type
ebook
Category
publication date
2021-06-11
what you will learn

Understand how network attacks can compromise data
Review practical uses of cryptography over time
Compare how symmetric and asymmetric encryption work
Explore how a hash can ensure data integrity and authentication
Understand the laws that govern the need to secure data
Discover the practical applications of cryptographic techniques
Find out how the PKI enables trust
Get to grips with how data can be secured using a VPN

no of pages
286
duration
572
key features
Discover how cryptography is used to secure data in motion as well as at rest * Compare symmetric with asymmetric encryption and learn how a hash is used * Get to grips with different types of cryptographic solutions along with common applications
approach
We’ll cover the need for encryption and learn common network attacks. We’ll then discuss symmetric and asymmetric encryption along with hash algorithms, and then outline the standards and laws that require organizations to prevent data loss. Finally, we’ll see the practical applications of cryptographic techniques, such as passwords, email, along with securely transmitting data using a VPN.
audience
This book is for IT managers, security professionals, students, teachers, and anyone looking to learn more about cryptography and understand why it is important in an organization as part of an overall security framework. A basic understanding of encryption and general networking terms and concepts is needed to get the most out of this book.
meta description
As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen data
short description
Every minute of the day, there are petabytes of data exchanged between our homes, cars, businesses, and IoT devices. But just what exactly is involved when using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals will help you to understand common cryptographic techniques and terms used today to secure our data.
subtitle
Learn how you can leverage encryption to better secure your organization's data
keywords
Cryptography, Cybersecurity Professional, ethical hackers, Public Infrastructure Key, cryptographic techniques, key management, applied cryptography
Product ISBN
9781838644352