Cryptography Fundamentals (English)

Cryptography Fundamentals (English)

Modern computing and secure internet communications are made possible by using cryptography. It is extremely important to understand cryptography and how it works so it can be implemented securely in our environment. Professionals need to have a practical understanding of cryptography and how they can use it for secure data communication and the preservation of data integrity, encryption, and non-repudiation. However, many security professionals find cryptography complex and challenging. The practical cryptography course is designed to help demystify cryptography and let you gain practical knowledge of cryptographic concepts and real-life implementation.

We bieden deze cursus ook in het Nederlands aan, bekijk het hier: Cryptography Fundamentals.

Doel

  • By the end of this practical cryptography course, you will be able to:
  • Understand the fundamental concepts of cryptography and how it works
  • Understand the different elements of cryptography
  • Understand what cryptography is used for and how it is used in practice to secure data communication
  • Understand the most common cryptographic algorithms and tools
  • Describe the concepts utilized in early substitution and transposition ciphers
  • Demonstrate a variety of uses for hashing, salt, and nonces in several scenarios
  • Understand how cryptography can be used to secure data at rest and in transit
  • Understand the TLS protocol and how to use it to secure data in transit
  • Understand digital rights management concepts and deployment
  • Understand PKI and its uses
  • Learn to implement digital certificate, digital signature
  • Learn to implement root certificate server
  • Learn about the use of cryptography in the blockchain technology
  • Understand how Data Right Management (DRM) works
  • Understand how to use cryptography in email security

Doelgroep

This course is designed for security professionals who want to develop a working knowledge of the most common cryptographic techniques and how they are used in practice. However, this course is essential for anyone who wants to understand how cryptography works and how it can be used to protect data, secure communication, provide authentication and non-repudiation

Voorkennis

It is assumed that you have a fundamental knowledge of computer networking and security concepts before enrolling in this practical cryptography course.

Onderwerpen

Day 2
Bulk encryption is a process of encrypting data. Bulk encryption is often used to protect data at rest, such as data stored on a hard drive or in the cloud.
Day 2
Day 1

  • Introduction to Cryptography
  • Symmetric Key Cryptography
  • Asymmetric Key Algorithms
  • Data security using bulk encryption
  • Message Integrity Using Hashing Algorithms
  • Cryptographic attacks
  • Cryptographic Applications
  • Digital Signature
  • Public Key Infrastructure
  • Public Key Integration in the Windows domain
  • Digital Certificate
  • Security Data in Transit with SSL/TLS
  • Digital Rights Management (DRM) Concepts and Deployment
  • Blockchain
  • Digital Currency (Coins) Day 1
  • Introduction to Cryptography
    • What is cryptography?
    • History of cryptography
    • Fundamental cryptographic concepts
    • Different elements of cryptography.
    • The problem we are solving with cryptography.
    • Cryptography algorithms
    • Encryption and decryption
  • Symmetric Key Cryptography
    • Introduction to symmetric key algorithms
    • Block ciphers vs stream ciphers
    • Encrypt and decrypt data using symmetric cryptography
    • Data Encryption Standard (DES)
    • DES and Triple DES (3DES)
    • Advanced Encryption Standard (AES)
    • International Data Encryption Algorithm (IDEA)
    • Blowfish algorithm
    • Twofish algorithm
    • Chacha 20 and Poly1305
  • Asymmetric Key Algorithms
    • Introduction to asymmetric key algorithms
    • Public-key cryptography
    • Diffie-Hellman key exchange
    • RSA
    • Elliptic Curve Cryptography
    • DSA
  • Data security using bulk encryption
    • Bulk encryption and its uses
    • Encrypt and decrypt data using bulk encryption
    • Configure bulk encryption on a web server
    • Test bulk encryption configuration
  • Message Integrity Using Hashing Algorithms
    • Introduction to hashing algorithms
    • Message integrity
    • Message authentication code
    • Hashing protocols: SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-160
    • Hash-Based Message Authentication Codes (HMAC)
  • Cryptographic attacks
    • Introduction to cryptographic attacks
    • Ciphertext only
    • Known plaintext
    • Chosen plaintext
    • Chosen ciphertext
    • Brute force
    • Man in the middle
    • Dictionary Replay
    • denial-of-service (DoS)
    • Birthday attack
  • Cryptographic Applications
    • Introduction to cryptographic applications
    • VPNs
    • Email security
    • Disk encryption
    • IPSec
  • Digital Signature
    • Introduction to digital signatures
    • What is a digital signature?
    • How does a digital signature work?
    • RSA, DSA, ECDSA digital signature algorithm
    • Validating a digital signature
    • Integrating digital signature in the email application
  • Public Key Infrastructure
    • Introduction to Public Key Infrastructure (PKI)
    • The PKI component
    • The root certificates
    • Using PKI to secure data communication
    • Setting up a PKI system
    • Setting up and configuring PKI on a Windows web server
    • Configuring enterprise trust by installing/managing a certification authority (CA)
    • Certificate Lifecycle Management process
  • Public Key Integration in the Windows domain
    • Managing PKI
    • Configure Certificate Templates
    • Configure Certificate Enrolment
    • Configuring Key Archival and Recovery
    • Configuring Trust Between Organizations
  • Digital Certificate
    • X.509 Certificates
    • One-Tier Certificate Authority
    • Two-Tier Certificate Authority
    • Three-Tier Certificate Authority
    • Certificate Attributes
    • Certificate Revocation Lists
    • The Online Certificate Status Protocol (OCSP)
    • Offline Root CA
    • Certificate Management
  • Security Data in Transit with SSL/TLS
    • Secure Socket Layer (SSL)/ Transport Security Layer (TLS)
    • The layers of the TLS protocol
    • TLS Handshake Protocol
    • The cipher suite
    • Client-side TLS
    • Server-side TLS
    • TLS Record Protocol
    • Different ways to configure TLS on a web server
    • TLS termination proxy or TLS/SSL Offloading
    • TLS Load Balancer
    • TLS Application gateway
    • Create and install SSL certificates
    • Harden TLS/SSL settings
  • Digital Rights Management (DRM) Concepts and Deployment
    • What DRM is and how it works
    • Different types of DRM technologies
    • How to implement DRM in your organization
    • The benefits and challenges of using D
  • Blockchain
    • Introduction to Blockchain technology
    • How blockchain works using cryptography
    • Bitcoin History
    • The use of Blockchain
    • The benefits and challenges of using Blockchain
  • Digital Currency (Coins)
    • Proof-of-Work Consensus (PoW)
    • A look at Bitcoin and Ethereum
    • coin Address
    • Transactions

Planning & Prijs

Ervaringen

ervaringen verzameld via Logo Springtest

Lucienne Groenendaal

Secretarieel medewerkster

"Training was prima, goede tips gekregen met af en toe een grap en grol. Locatie was prima, goed verzogd vwb koffie/thee, fruit en koekje. Mensen ook zeer vriendelijk. Lunch was perfect en zeer uitgebreid."

9

Ariana Scheepers

"De cursus was goed, en de verzorging ook!Ik heb er veel van opgestoken! De lokatie in Nieuwegein is goed te bereiken met het openbaar vervoer, dus dat is prettig. Tot een volgenden keer."

10

Eric Pos

Procesbeheerder bij Gemeente Amersfoort

"Ik vond de training erg leerzaam. De inhoud was van een hoog niveau en de docent was goed thuis in de materie. Ik stel het vooral op prijs dat er diep op de concepten werd ingegaan."

9
De cursus is toegevoegd aan jouw favorieten.

Jouw favorieten kun je bekijken via je profiel (deze vind je in het menu bovenaan de website).

Kunnen wij je helpen?

Laat jouw telefoonnummer of e-mailadres achter en wij nemen binnen 24 uur contact met je op.


Cursus: Cryptography Fundamentals (English)


    E-mailadres

    Telefoonnummer

    Opmerking of vraag


    Meer weten

    Vul onderstaand formulier in en je ontvangt meer informatie over deze cursus.


    Cursus: Cryptography Fundamentals (English)

      Wij helpen je graag

      Geen tijd om ons gehele aanbod aan cursussen te bekijken? Of heb je een andere vraag? Wij helpen je graag. Vul onderstaande vragen in en we nemen binnen 24 uur contact met je op.

      Cryptography Fundamentals (English)







        Onderwerpen
        Actieve filters: Wis alle filters
        Pageloader
        PRIVACY VOORWAARDEN

        Jouw persoonsgegevens worden opgenomen in onze beschermde database en worden niet aan derden verstrekt. Je stemt hiermee in dat wij jou van onze aanbiedingen op de hoogte houden. In al onze correspondentie zit een afmeldmogelijkheid