File Encryption Basics and Best Practices using CrococryptFile

A practical how-to for CrococryptFile including a general introduction to file encryption and what it means on the technical level.

You will learn how to use CrococryptFile, the open-source file encryption solution. In this course, you will also learn what encryption means on the technical level – as a background information to choose the right file encryption method for your case. If you care about data privacy and if you are willing to do something about it: Congratulations, you are already on the right track!

This course is for enterprise and private users alike. First, you will get an introduction on encryption in general to understand the characteristics of the different existing technologies. After that, we will go through the CrococryptFile application family step-by-step: Windows, Linux, Web-based and Command-line interface.

At the end of this course, you will be able to...

  • Choose appropriate encryption methods for sensitive data files
  • Challenge security claims about encryption
  • Deploy CrococryptFile in a SMB enterprise environment

Chapters

NumberTitleSummary
1Introduction to Encryption and File-encryptionThe chapter gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level.
2 CrococryptFile Windows InstallationThe chapter contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components.
3 Password-based Encryption, Decryption and WebDecryptThe chapter demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family.
4 Token-based Encryption with Windows Keystore and OpenPGPThe chapter demonstrates how to use tokens to encrypt file archives with CrococryptFile.
5 Forensics on Headerless encrypted FilesThe chapter explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile.
6Linux, Unix and Command-line usageThe chapter demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes.
Course Assessment Questionnaire This assessment questionnaire gives you the opportunity to verifiy your learning progress.