Cyber Security and Cryptography
One day course - Cyber Security and Cryptography: Encryption, Certificates and other Security Techniques
Cryptography is a vital part of cyber security.
Cryptography is a set of techniques that enable security and trust by providing confidentiality, authentication, and data integrity. Many secure applications and protocols rely on combinations of properly applied and supported cryptographic techniques, from protecting personal and commercial information using encryption, to e-commerce, secure communication, IoT and network security.
This crypto course develops in a progressive way an overall understanding of cryptography. It adopts a generic approach to build a core competence that can be taken away and readily applied to many different products, systems and architectures.
The course covers all of the main cryptographic techniques, including their different functions and characteristics, how they are properly applied, and how they work together to achieve different security objectives. The course then looks at a subject vital to the effective use of such techniques, namely cryptographic key management. This encompasses the whole key life cycle, including digital certificates and PKI.
- Develop a broad knowledge that can be applied across many different systems and applications
- Establish a solid foundation on which to make judgements or assessments of security solutions
- Appreciate the different key management options and requirements necessary for the use of cryptographic techniques to be truly effective and appropriate
Course DescriptionThe course assumes no prior knowledge and includes the following:
- Cryptographic services
- Design principles
- Cipher types and characteristics
- Symmetric ciphers & encryption: provably secure encryption; stream ciphers; block ciphers (including DES and AES); modes of operation (such as CBC and GCM); Message Authentication Codes (MACs)
- Public key systems, including Diffie-Hellman and RSA
- Hash functions, zero-knowledge protocols, homomorphic encryption, Elliptic Curve systems
- Digital Signatures
- Key management, including generation, distribution, storage, PKI and certificates
Who Should AttendAnyone with a need to know or interest in cryptography, such as:
- Those with some familiarity with cryptography and key management who wish to broaden their knowledge and gain a perspective over the entire subject
- Security engineers
- Those with responsibility for managing, assessing or defining policy for cyber security and new applications
- Application developers