Hi [[ session.user.profile.firstName ]]
Sort by:
    • Application of Cryptography for Enterprise Security Application of Cryptography for Enterprise Security Dr Michael H. Goldner, Dean of EC-Council University, EC-Council University Recorded: Dec 17 2014 7:00 pm UTC 113 mins
    • Cryptography is the practice and study of techniques for keeping secrets. While the practice of keeping information hidden, or secured, has been around throughout the history of mankind, Modern Cryptography has evolved into much more. Now we use various algorithms (a fancy word for mathematical formulas) to not only keep information secured (Confidentiality), but also to authenticate the message and the originator of that message (Authentication); to stop the sender of the message from denying they sent it (Non-Repudiation); and to make sure that the information has not accidentally or purposely altered or corrupted (Integrity). This basic workshop will explain the basic concepts discussed above, as well as the differences between Symmetric and Asymmetric encryption. We will discuss Steganograhy, Digital certificates, Public Key Infrastructure and Digital Signatures. Although the workshop is to enhance basic understanding of these concepts, anyone studying for one of the major certification examinations in information security, such as the recently launched EC-Council Certified Chief Information Security Officer (C|CISO) will need to have a good grasp of these important concepts.

      Read more >
    • Application of Cryptography for Enterprise Security Application of Cryptography for Enterprise Security Dr Michael H. Goldner, Dean of EC-Council University, EC-Council University Recorded: Jul 31 2014 1:00 pm UTC 113 mins
    • Cryptography is the practice and study of techniques for keeping secrets. While the practice of keeping information hidden, or secured, has been around throughout the history of mankind, Modern Cryptography has evolved into much more. Now we use various algorithms (a fancy word for mathematical formulas) to not only keep information secured (Confidentiality), but also to authenticate the message and the originator of that message (Authentication); to stop the sender of the message from denying they sent it (Non-Repudiation); and to make sure that the information has not accidentally or purposely altered or corrupted (Integrity). This basic workshop will explain the basic concepts discussed above, as well as the differences between Symmetric and Asymmetric encryption. We will discuss Steganograhy, Digital certificates, Public Key Infrastructure and Digital Signatures. Although the workshop is to enhance basic understanding of these concepts, anyone studying for one of the major certification examinations in information security, such as the recently launched EC-Council Certified Chief Information Security Officer (C|CISO) will need to have a good grasp of these important concepts.

      Read more >
    • From leaky apps to trusted agents – Cryptography to the rescue! From leaky apps to trusted agents – Cryptography to the rescue! Richard Moulds, Thales e-Security, VP Strategy & Product Marketing Recorded: Nov 12 2013 7:00 pm UTC 45 mins
    • Software applications have access to your most critical data assets and form the core of your security infrastructure. Whether processing transactions, managing credentials, guarding your best kept secrets or crunching your data analytics your applications represent an attractive target and need to be locked down. Applications can be abused, subtly modified or aggressively attacked in an attempt to access the data you entrusted to them. Now with the race to virtualization, cloud computing and widespread mobility the threats to application security can only get worse.

      Cryptographic tools such as encryption have been used to protect data for years but how strong is that encryption? Can it just be turned off? Can data be extracted long before it is encrypted or can keys be stolen without a trace, enabling attackers to crack the code at their leisure? During this session we will look not only at protecting the integrity of applications but also to securing them as they execute and guarding the secrets they use. We’ll cover developments in the area of key management and tips for deploying hardware security modules (HSM) so that your applications can earn the trust they deserve.

      Read more >
    • An Overview of Modern Cryptography An Overview of Modern Cryptography Chuck Easttom, Computer Scientist, Author, and Educator Recorded: May 5 2011 12:00 pm UTC 47 mins
    • This course is an overview of modern cryptography algorithms and will describe asymmetric algorithms such as DES, 3DES, AES, and Blowfish as well as asymmetric algorithms such as RSA, Diffie-Hellman, and Elliptic Curve.

      Chuck Easttom is the author of 11 computer science books including 2 computer security textbooks used at universities around the globe and translated into several languages. He also holds a host of IT certifications including MCP, MCSA, MCSE, MCAD, MCTS (Windows 7, Windows Server 2008, SQL Server 2008, and Visual Studio 2010), MCITP (Windows 7 and SQL Server 2008), MCDBA, MCT, A+, Network+, Linux+,iNet+, Server+, CEH, CHFI, ECSA, CEI, and CISSP. He currently has 7 provisional patents, all related to computer science and 4 related to computer security. One of those patents regards a new method of steganography, another regards a new approach to detecting spyware, and yet another involves the invention of a new, more stable file system.

      He is also the inventor of a method for quantifying network security that is being taught at several universities, and most recently has developed a new approach to creating ghost drives. He has taught various security related courses for several years and has over 10 years of teaching experience. He is also a frequent consultant on various computer related court cases including both criminal and patent cases. While Mr. Easttom has a broad range of security expertise, his passion has always been cryptography

      Read more >