Cryptography Fundamentals (English) Opslaan als favoriet Deel deze pagina Printen Deze cursus hebben we niet meer in ons assortiment maar nog wel andere cursussen, bijvoorbeeld: De cursus De cursus Certified Data Center Facilities Operations Specialist – CDFOS® (incl. examen) De cursus Certified Datacenter Specialist – CDCS® (exam incl.) (English) De cursus Programming with HTML, CSS, and JavaScript – Active Learning Kunnen wij je helpen? Neem contact met mij op Ik neem zelf contact op Modern computing and secure internet communications are made possible by using cryptography. It is extremely important to understand cryptography and how it works so it can be implemented securely in our environment. Professionals need to have a practical understanding of cryptography and how they can use it for secure data communication and the preservation of data integrity, encryption, and non-repudiation. However, many security professionals find cryptography complex and challenging. The practical cryptography course is designed to help demystify cryptography and let you gain practical knowledge of cryptographic concepts and real-life implementation. We bieden deze cursus ook in het Nederlands aan, bekijk het hier: Cryptography Fundamentals. Doel By the end of this practical cryptography course, you will be able to: Understand the fundamental concepts of cryptography and how it works Understand the different elements of cryptography Understand what cryptography is used for and how it is used in practice to secure data communication Understand the most common cryptographic algorithms and tools Describe the concepts utilized in early substitution and transposition ciphers Demonstrate a variety of uses for hashing, salt, and nonces in several scenarios Understand how cryptography can be used to secure data at rest and in transit Understand the TLS protocol and how to use it to secure data in transit Understand digital rights management concepts and deployment Understand PKI and its uses Learn to implement digital certificate, digital signature Learn to implement root certificate server Learn about the use of cryptography in the blockchain technology Understand how Data Right Management (DRM) works Understand how to use cryptography in email security Doelgroep This course is designed for security professionals who want to develop a working knowledge of the most common cryptographic techniques and how they are used in practice. However, this course is essential for anyone who wants to understand how cryptography works and how it can be used to protect data, secure communication, provide authentication and non-repudiation Voorkennis It is assumed that you have a fundamental knowledge of computer networking and security concepts before enrolling in this practical cryptography course. Persoonlijk advies? Rokus Janssen salesmanager T. 088 542 78 88 E. r.janssen@vijfhart.nl Onderwerpen Day 2Bulk encryption is a process of encrypting data. Bulk encryption is often used to protect data at rest, such as data stored on a hard drive or in the cloud.Day 2Day 1 Introduction to Cryptography Symmetric Key Cryptography Asymmetric Key Algorithms Data security using bulk encryption Message Integrity Using Hashing Algorithms Cryptographic attacks Cryptographic Applications Digital Signature Public Key Infrastructure Public Key Integration in the Windows domain Digital Certificate Security Data in Transit with SSL/TLS Digital Rights Management (DRM) Concepts and Deployment Blockchain Digital Currency (Coins) Day 1 Introduction to Cryptography What is cryptography? History of cryptography Fundamental cryptographic concepts Different elements of cryptography. The problem we are solving with cryptography. Cryptography algorithms Encryption and decryption Symmetric Key Cryptography Introduction to symmetric key algorithms Block ciphers vs stream ciphers Encrypt and decrypt data using symmetric cryptography Data Encryption Standard (DES) DES and Triple DES (3DES) Advanced Encryption Standard (AES) International Data Encryption Algorithm (IDEA) Blowfish algorithm Twofish algorithm Chacha 20 and Poly1305 Asymmetric Key Algorithms Introduction to asymmetric key algorithms Public-key cryptography Diffie-Hellman key exchange RSA Elliptic Curve Cryptography DSA Data security using bulk encryption Bulk encryption and its uses Encrypt and decrypt data using bulk encryption Configure bulk encryption on a web server Test bulk encryption configuration Message Integrity Using Hashing Algorithms Introduction to hashing algorithms Message integrity Message authentication code Hashing protocols: SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-160 Hash-Based Message Authentication Codes (HMAC) Cryptographic attacks Introduction to cryptographic attacks Ciphertext only Known plaintext Chosen plaintext Chosen ciphertext Brute force Man in the middle Dictionary Replay denial-of-service (DoS) Birthday attack Cryptographic Applications Introduction to cryptographic applications VPNs Email security Disk encryption IPSec Digital Signature Introduction to digital signatures What is a digital signature? How does a digital signature work? RSA, DSA, ECDSA digital signature algorithm Validating a digital signature Integrating digital signature in the email application Public Key Infrastructure Introduction to Public Key Infrastructure (PKI) The PKI component The root certificates Using PKI to secure data communication Setting up a PKI system Setting up and configuring PKI on a Windows web server Configuring enterprise trust by installing/managing a certification authority (CA) Certificate Lifecycle Management process Public Key Integration in the Windows domain Managing PKI Configure Certificate Templates Configure Certificate Enrolment Configuring Key Archival and Recovery Configuring Trust Between Organizations Digital Certificate X.509 Certificates One-Tier Certificate Authority Two-Tier Certificate Authority Three-Tier Certificate Authority Certificate Attributes Certificate Revocation Lists The Online Certificate Status Protocol (OCSP) Offline Root CA Certificate Management Security Data in Transit with SSL/TLS Secure Socket Layer (SSL)/ Transport Security Layer (TLS) The layers of the TLS protocol TLS Handshake Protocol The cipher suite Client-side TLS Server-side TLS TLS Record Protocol Different ways to configure TLS on a web server TLS termination proxy or TLS/SSL Offloading TLS Load Balancer TLS Application gateway Create and install SSL certificates Harden TLS/SSL settings Digital Rights Management (DRM) Concepts and Deployment What DRM is and how it works Different types of DRM technologies How to implement DRM in your organization The benefits and challenges of using D Blockchain Introduction to Blockchain technology How blockchain works using cryptography Bitcoin History The use of Blockchain The benefits and challenges of using Blockchain Digital Currency (Coins) Proof-of-Work Consensus (PoW) A look at Bitcoin and Ethereum coin Address Transactions Planning & Prijs Gerelateerde cursussen De cursus De cursus Certified Data Center Facilities Operations Specialist – CDFOS® (incl. examen) De cursus Certified Datacenter Specialist – CDCS® (exam incl.) (English) De cursus Programming with HTML, CSS, and JavaScript – Active Learning Ervaringen ervaringen verzameld via Lucienne Groenendaal Secretarieel medewerkster "Training was prima, goede tips gekregen met af en toe een grap en grol. Locatie was prima, goed verzogd vwb koffie/thee, fruit en koekje. Mensen ook zeer vriendelijk. Lunch was perfect en zeer uitgebreid." 9 Ariana Scheepers "De cursus was goed, en de verzorging ook!Ik heb er veel van opgestoken! De lokatie in Nieuwegein is goed te bereiken met het openbaar vervoer, dus dat is prettig. Tot een volgenden keer." 10 Eric Pos Procesbeheerder bij Gemeente Amersfoort "Ik vond de training erg leerzaam. De inhoud was van een hoog niveau en de docent was goed thuis in de materie. Ik stel het vooral op prijs dat er diep op de concepten werd ingegaan." 9 Share: Share Share Share Share
Lucienne Groenendaal Secretarieel medewerkster "Training was prima, goede tips gekregen met af en toe een grap en grol. Locatie was prima, goed verzogd vwb koffie/thee, fruit en koekje. Mensen ook zeer vriendelijk. Lunch was perfect en zeer uitgebreid." 9
Ariana Scheepers "De cursus was goed, en de verzorging ook!Ik heb er veel van opgestoken! De lokatie in Nieuwegein is goed te bereiken met het openbaar vervoer, dus dat is prettig. Tot een volgenden keer." 10
Eric Pos Procesbeheerder bij Gemeente Amersfoort "Ik vond de training erg leerzaam. De inhoud was van een hoog niveau en de docent was goed thuis in de materie. Ik stel het vooral op prijs dat er diep op de concepten werd ingegaan." 9