BQA Accredited Cyber Courses
Cryptography 1 Day
Cryptographic services form the foundation for many security implementations and provide both confidentiality and integrity of data when that data might be exposed to untrusted parties. Understanding the basic functions of cryptography and how encryption and hashing provide confidentiality and integrity help in the creation of a successful security policy.
It is also important to have a good understanding of the issues involved in key management. Cryptographic hashes and digital signatures play a major role in modern cryptosystems, and it is important to have a good understanding of the basic mechanisms of these algorithms and some of the issues that are involved in choosing a particular hashing algorithm or digital signature method. This course provides a primer on the theory of cryptography.
It discusses the principles behind symmetric encryption, provides examples of major symmetric encryption algorithms, and examines their operations, strengths, and weaknesses. This course also touches on the major hashing algorithms that use Hashed Message Authentication Code (HMAC), and the digital signature technologies that are widely used in modern computing and networking.
It also describes some of the real-world implications of using various algorithms and technologies. The principles behind asymmetric encryption and provides examples of major asymmetric encryption algorithms, including Rivest, Shamir, and Adleman (RSA); Diffie-Hellman (DH); and public key infrastructure (PKI) are also covered.
Key Concepts, History and Common Terminology Used in Cryptography
Uses of Cryptography & Cryptographic Life Cycle / Methods of Cryptography
Maintaining Network Security
The Different Encryption Systems.Algorithm Concepts / Methods of Cryptanalytic Attacks
Maintaining Application Security
Information Hiding Alternatives
2. Those who have a technical or management responsibility for implementing security and who need to be aware of cryptography and key management techniques. Anyone who wishes to develop an understanding or appreciation of how cryptographic techniques can be used to solve a number of security problems. Security professionals who are planning to write CISSP certification exam. Module Organisation
2. Understand both the importance of cryptographic key management, and the different key management requirements and practices associated with the use of different security techniques. Appreciate how the techniques described are employed in practice in a variety of security applications, from SSL enabled websites through to disk encryption