Video description
Privacy is essential for individuals and democracy as a whole – and the only real way to achieve this is with strong encryption. The target audience for this video is anyone who wants to keep their communications truly private. This could be personal information or intellectual property – the solutions are the same.
After viewing this video, you will understand:
- Why privacy is important, not just for individuals but for democracy and society
- The basics of encryption and how it is essential for privacy
- The difference between data at rest and data in motion
- How data travels between computers/devices on the internet
- The trade-offs between security, convenience, and cost
- How to set up truly secure and private communications
What You Will Learn
- Define privacy and why it’s so important
- Discover how the internet really works
- Gain an understanding of cryptography and encryption
- Set up secure email, messaging, and file sharing
- Enable secure and private web browsing (HTTPS, VPNs, and DNS over HTTPS)
Who This Video Is For
Anyone who wants to keep their communications truly private.Table of contents
- Introduction
- Introduction to Digital Security and Privacy: Terminology and Concepts
- How the Internet Works: The Post Office of Packets
- Secure Communications Using Encryption: Let’s Meet Alice and Bob
- Choosing Secure Private Communications Tools: Email, Messaging and File Transfer
- Authentication Restricting Access: Strong Passwords and Two-Factor Auth
- Conclusion
Product information
- Title: Maximum Privacy with End-to-End Encryption: Learn to Keep Communications Private
- Author(s):
- Release date: April 2021
- Publisher(s): Apress
- ISBN: 9781484270349
You might also like
book
Cybersecurity Law
This book gives insight into the legal aspects of data ownership in the 21st century. With …
book
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical …
audiobook
Cybercrime Investigators Handbook
Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks …
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …