Cryptography 1 Day

Cryptographic services form the foundation for many security implementations and provide both confidentiality and integrity of data when that data might be exposed to untrusted parties. Understanding the basic functions of cryptography and how encryption and hashing provide confidentiality and integrity help in the creation of a successful security policy.

It is also important to have a good understanding of the issues involved in key management. Cryptographic hashes and digital signatures play a major role in modern cryptosystems, and it is important to have a good understanding of the basic mechanisms of these algorithms and some of the issues that are involved in choosing a particular hashing algorithm or digital signature method. This course provides a primer on the theory of cryptography.

It discusses the principles behind symmetric encryption, provides examples of major symmetric encryption algorithms, and examines their operations, strengths, and weaknesses. This course also touches on the major hashing algorithms that use Hashed Message Authentication Code (HMAC), and the digital signature technologies that are widely used in modern computing and networking.

It also describes some of the real-world implications of using various algorithms and technologies. The principles behind asymmetric encryption and provides examples of major asymmetric encryption algorithms, including Rivest, Shamir, and Adleman (RSA); Diffie-Hellman (DH); and public key infrastructure (PKI) are also covered.

Course Content

Key Concepts, History and Common Terminology Used in Cryptography

Uses of Cryptography & Cryptographic Life Cycle / Methods of Cryptography

Maintaining Network Security

The Different Encryption Systems.Algorithm Concepts / Methods of Cryptanalytic Attacks

Maintaining Application Security

Information Hiding Alternatives

and more...

1. Anyone who is required to develop a broad and deep knowledge and understanding of Cryptography. IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers.

2. Those who have a technical or management responsibility for implementing security and who need to be aware of cryptography and key management techniques. Anyone who wishes to develop an understanding or appreciation of how cryptographic techniques can be used to solve a number of security problems. Security professionals who are planning to write CISSP certification exam. Module Organisation
1. Appreciate the core techniques of cryptography and how they can be applied to meet various security objectives.

2. Understand both the importance of cryptographic key management, and the different key management requirements and practices associated with the use of different security techniques. Appreciate how the techniques described are employed in practice in a variety of security applications, from SSL enabled websites through to disk encryption