Application of Cryptography for Enterprise Security

Presented by

Dr Michael H. Goldner, Dean of EC-Council University, EC-Council University

About this talk

Cryptography is the practice and study of techniques for keeping secrets. While the practice of keeping information hidden, or secured, has been around throughout the history of mankind, Modern Cryptography has evolved into much more. Now we use various algorithms (a fancy word for mathematical formulas) to not only keep information secured (Confidentiality), but also to authenticate the message and the originator of that message (Authentication); to stop the sender of the message from denying they sent it (Non-Repudiation); and to make sure that the information has not accidentally or purposely altered or corrupted (Integrity). This basic workshop will explain the basic concepts discussed above, as well as the differences between Symmetric and Asymmetric encryption. We will discuss Steganograhy, Digital certificates, Public Key Infrastructure and Digital Signatures. Although the workshop is to enhance basic understanding of these concepts, anyone studying for one of the major certification examinations in information security, such as the recently launched EC-Council Certified Chief Information Security Officer (C|CISO) will need to have a good grasp of these important concepts.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13397)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more