Cryptography Courses Online

Security - Cryptography

Live Instructor Led Online Training Cryptography courses is delivered using an interactive remote desktop! .

During the course each participant will be able to perform Cryptography exercises on their remote desktop provided by Qwikcourse.


How do I start learning Cryptography?


Select among the courses listed in the category that really interests you.

If you are interested in learning the course under this category, click the "Book" button and purchase the course. Select your preferred schedule at least 5 days ahead. You will receive an email confirmation and we will communicate with trainer of your selected course.

Cryptography Training


Explore j4sign

About

This project is devoted to provide a simple software layer for digital signature, when an hardware cryptographic token is required. The default implementation tries to comply as strictly as possible with the italian law digital signature directives.


7 hours

$1,990

Learn Cryptonik

About

Text encryption tool using Vigenère cipher

Cryptonik-Text is a useful, simple to use tool for encrypt/decrypt text docs, messages, notes etc. Application uses a charset that can be typed from any keyboard (on-screen or hardware). Some national symbols are converted to 26 standard latin letters.


7 hours

$1,990

Discover EasyJCE

About

Provides encryption & password hashing for your app or Hibernate POJOs

EasyJCE provides an easy to use interface for encrypting, decrypting, and hashing data for transmission or storage using the Java Cryptographic Extension (JCE). A set of Hibernate user types is included to transparently integrate encryption into the data layer in a JPA/Hibernate environment, ensuring data is persisted in its encrypted form while obscuring encryption and decryption logic from application code. EasyJCE supports most algorithms implemented for the JCE, including those provided by third-party encryption service providers. Integrated MAC (Message Authentication Code) support can optionally be used to ensure data integrity and indicate possible data tampering. EasyJCE also provides basic encoding and decoding facilities for transmitting encrypted binary data through mediums which are limited to printable ASCII characters, such as email messages or URL's.


7 hours

$1,990

Basics of EncrypIT

About

Program to quickly and easily encrypt or decrypt files or directories

Program to quickly and easily encrypt or decrypt files or directories using Encrypting File System (EFS) as well as add and remove domain user EFS permissions to a file. There is also a button to backup a users EFS PFX certificate.


7 hours

$1,990

Basics of Endico Text Encrypt

About

Fastest way to make secure text.

Help to convert text into secret codes , so that you can mail,chat and transfer text securely to prevent hacking. How to use : Step one - Open Endico 14 Step two - Decide what to do (Text Encode/Text Decode) Step three - If You Selected Text Encode -> Then Type/Copy/Open .txt file to convert. Step four - Copy the converted text into clipboard to chat,mail,print process etc. Step five - If you want to Decode the code the again follow step two. Step six - Congratulations! you done it . Advantages and Applications 1. Fast and East TEXT encoding. 2. Fast and Easy Code decoding. 3. Easy User Interface & 24x7 Support. 4. Low system requirements. 6. Easy to share outputs. Note : Use same application to decode the data . (C) Logicwoods Ind


7 hours

$1,990

Know Format Preserving Encryption

About

Format-Preserving Encryption Library for Java

This package implements the FF1, FF3, and FFX algorithms and the A2 and A10 parameter sets for format-preserving encryption. The FF1 and FF3 methods for format-preserving encryption are implementations of NIST Special Publication 800-38G, Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption. The FFX algorithm and A2 and A10 parameter sets are implementations of "The FFX Mode of Operation for Format-Preserving Encryption," by Mihir Bellare, Phillip Rogaway, and Terence Spies. For more information see the README.txt and package-info.java files in the source.


7 hours

$1,990

Discover WebLocker

About

Ad-Blocker ,Anti-Porn, Anti-DNS Leak, Web Blocker, Connectivity Fixer

WebLocker is a free software that allows you to block annoying ads, block domains known to spread malware, block adult websites (Pornography), block social networks, block online gambling, stop DNS leaking and more features. Available for Windows: XP, 7, 8, 8.1 and 10. We hope you enjoy using WebLocker! TheYousSoft Team


7 hours

$1,990

Explore Is My Download Broken

About

a powerful multipurpose checksum utility

It's a cross platform utility designed for performing various checksumming activities. It supports verity of standards including ADLER-32, CRC-32, MD2, MD5, MURMUR-32, MURMUR-128, SHA-1, SHA-256, SHA-384, SHA-512 and SIPHASH24. Also generated results can be validated within the application. Results can be saved to a text file format. It can batch process folders as well. This tool requires Java Run-time Environment 7 or higher to use.


7 hours

$1,990

Know JCryptor

About

JCryptor is an encrypting tool based on the Caesar-cipher.

JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13. ROT13 can be decrypted by encrypting it again with ROT13. Even today this simple method is used by authorities to protect documents from unintentional reading. --UPDATE-- [25.01.14] Release 1.0 (final) -- Bugfixes [05.05.12] Release 0.2 -- implements polyalphabeticel substitution


7 hours

$1,990

Work around with N0m3nc Data Protection Software

About

Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..


7 hours

$1,990

Fundamentals of ActiveLock

About

ActiveLock is an open-source copy protection, software licensing framework for all development enviroments supporting COM+ architecture. Core DLL available in VB2008 and VB6. Samples in C++, C#, Excel/Access VBA and keygens in PHP, ASP.NET available.


7 hours

$1,990

Fundamentals of Global Platform for Java SmartCardIO

About

The project provides functionality to interface the SmartCardIO Java SDK library to Global Platform compliant smart cards, similar to globalplatform.sf.net. The difference is pure Java implementation and easy plug in to your SmartCardIO applications. This project is now more or less subsumed by Martin Paljak's continuation of the project at .


7 hours

$1,990

Learn Open Hashtool

About

Comfortable hash-tool for texts and files

Open-Hashtool is an easy2use Qt based application, which can be used to calculate the hash (MD4; MD5; SHA-1; SHA-224; SHA-256; SHA-384; SHA-512; SHA3-224; SHA3-256; SHA3-386; SHA3-512) of texts and files. It's compatible with Windows and Linux. But Linux users need Qt5.1 or Wine (configuration: Windows Version <= Windows 2008) to run the Open-Hashtool. Please read the Wiki for compiling instructions.


7 hours

$1,990

Work around with Hash Cracker

About

Hash Cracker is an application developed in java swings that allows a user to crack MD2, MD5, SHA-1,SHA-256,SHA-384,SHA-512 hashes either using brute force or using wordlists of the user's choice based on the users choice.


7 hours

$1,990

Work around with Password Keeper Generator

About

Free portable cross-platform graphical multi-user password manager

Free portable cross-platform multi-user password manager, 100%-pure Java. DB for each pkg-user is encrypted and protected by pkg-user hash. In addition - passwords in DB are stored in encrypted form. In result - stored passwords are double encrypted ! Passwords of pkg-users are not stored in program - stored and compared only hashes. Support md2, md5, sha1, sha256, sha384 and sha512 hash. Support export DB to CSV, HTML, XLS or XML and import from CSV, XLS or XML. Simple and intuitive GUI - Graphical User Interface. PKG use crypto security random generator. Developed with Java Spring Framework. Tested in Windows/Linux. Need Jre-1.8 - . Source - . Put a star on github please !


7 hours

$1,990

Basics of NewAES2k Enigma

About

The NewAES2k is STRONG Crypto system which is a super-encipherment using many algorithms in composite, such as AES Rijndael, SERPENT, CAST, TWOFISH, RC6, SAFER+, ANUBIS, MARS, etc. With a var block 32 to 256 Chars & fixed 512 chars [4096-bit] Key.


7 hours

$1,990

Explore OhCrypt Encryption Tool

About

OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files


7 hours

$1,990

Learn PGP Individual UID Signer

About

PGP Individual UID Signer makes signing all the UIDs on all of the keys at a PGP Keysigning party much simpler. It prompts for verification fingerprints, and then signs each UID on each key separately and PGP/Mime encrypt-emails them to their recipient. NOTE: Developement now happens at GitHub:


7 hours

$1,990

Learn PasswordMinder

About

It's hard remembering good passwords. Most people pick a one or two passwords and use them all over the place, which is a really bad idea, and we all feel bad about doing it. I got sick of feeling like this, so I wrote PWM to manage passwords for me. I f


7 hours

$1,990

Discover cryptonit

About

A simple, secure and free tool for encryption and signature for Microsoft Windows and Unix. Part of the IDEALX "OpenTrust" suite (IDX-PKI, IMC, IDX-smbldap-tools...), it provides confidentiality and security through X.509-PKCS certificates. Languages:


7 hours

$1,990

Explore TinyObfuscate

About

A tool for strings obfuscation tool in c++ by Michael Haephrati

When you need encrypt/obfuscate strings in your program so that they don't just show up with a strings or hex tool when your executable is examined, this tool can be useful. See Code Project article: by Michael Haephrati


7 hours

$1,990

Discover Simple Cipher Decoder

About

Decrypts and encrypts substitution, transposition and vigenere ciphers

Change log 1.01: 1)Error fixed on clicking solve and arrow buttons in the vigenere decoder 2)Error fixed when number of columns exceeds text length in substiution cipher 3)Can now handle variable block length when changing columns 4)Multiple identicle conversion values onn the frequency analysis page now not allowed This project is near its final stages but there may still be improvements to be made. If you could write some form of review or send me an email with advice I would greatly appreciate it. This is a series of three simple programs that will allow you to easily encrypt and decrypt text using any combination of substitutions, transpositions, vigenere ciphers or caesar shifts. The programs will not completely solve the ciphers for you haowever they will make it very clear to see how to solve them and ensure that there is no need for tedious manual work.


7 hours

$1,990

Fundamentals of SHA1 Implementation for Delphi XE2

About

Generate sha1 hash/digest from strings in Delphi

This is a Delphi unit that defines a TSHA1 class. It is simple to use and allows generating SHA-1 hash digests from Delphi strings according to . Unicode strings are encoded as UTF-1, which is what MySQL and several online tools I tested against do. So far, it seems to work. 


7 hours

$1,990

Know SOLEid

About

SOLEid is a multi-purpose file protector that helps users to easily protect their files with different protection measures. The ones that are included till date are: password protection, hardware id lock, username and process protection.


7 hours

$1,990

Learn SecurePDF file encryption utility

About

This project aims to provide a desktop applet which secures any file by encapsulating it in a PDF document protected by RC4 128 bit encryption. This PDF file can be opened in any Adobe Reader after supplying the original password, making it easy to use.


7 hours

$1,990


Is learning Cryptography hard?


In the field of Cryptography learning from a live instructor-led and hand-on training courses would make a big difference as compared with watching a video learning materials. Participants must maintain focus and interact with the trainer for questions and concerns. In Qwikcourse, trainers and participants uses DaDesktop , a cloud desktop environment designed for instructors and students who wish to carry out interactive, hands-on training from distant physical locations.


Is Cryptography a good field?


For now, there are tremendous work opportunities for various IT fields. Most of the courses in Cryptography is a great source of IT learning with hands-on training and experience which could be a great contribution to your portfolio.



Cryptography Online Courses, Cryptography Training, Cryptography Instructor-led, Cryptography Live Trainer, Cryptography Trainer, Cryptography Online Lesson, Cryptography Education