Course: Cryptography Fundamentals
duration: 5 hours |
Language: English (US) |
access duration: 90 days |
Details
In this Cryptography Fundamenals training course you will learn how cryptography is used to protect and secure data. Among subjects that covered are different methods, different components, how to use cryptographic keys and how cryptanalyses is used in cryptographic systems and far more.
Result
After completing this course you are familiar with cryptography and how cryptography is used to protect en secure data.
Prerequisites
There is no specific knowledge required.
Target audience
Software Developer, Web Developer
Content
Cryptography Fundamentals
Cryptography Fundamentals: Defining Cryptography
- start the course
- describe and identify the reasons for having and using cryptography
- recognize historical uses of cryptography and their relevance to cryptography today
- use and identify basic cryptographic terminology
- describe why cryptography is difficult to get right and how poor cryptography can give you a false sense of security
- identify the different types of cryptography and how cryptographic algorithms can be verified and validated
- describe basic export controls and limits that can be imposed on cryptography used around the world
- describe how cryptography can keep data confidential and within limits
- describe why data integrity is an integral part of cryptography
- define how cryptography can provide a means to authenticate an entity
- describe how cryptography can be used to prove, with high certainty, that an action or statement is associated with an entity
- describe how OTP, or one-time pad, cryptography can theoretically provide perfect secrecy but has some significant limitations
- describe and use a substitution cipher and understand the weaknesses that can be exploited by an attacker against these ciphers
- describe and identify the features and use cases for symmetric-key cipher algorithms
- describe and identify the features and use cases for asymmetric-key cipher algorithms
- describe the use of steganography in encryption products to hide the fact data is even encrypted
- describe the purpose of cryptographic hash functions and how they can be used in cryptography to provide data integrity
- describe a digital signature and how it can be used for authentication and non-repudiation
- recognize the difference between blocks and key sizes as they apply to cipher algorithms
- describe and perform padding operations to data for block ciphers
- describe how to encode encrypted data for easier storage or transport
- describe the purpose of an initialization vector for a cipher algorithm and how nonces can be used to protect small datasets
- describe how entropy is used in generating random numbers and how that entropy is critical to the strength of a cryptographic key
- describe the creating, or generating, of keys and how the key strength is critical to cryptographic ciphers
- identify the cryptographic algorithm to use
Cryptography Fundamentals: Applying Cryptography
- start the course
- describe and identify data that has been encrypted using the ECB mode
- specify how Cipher Block Chaining uses an IV, or initialization vector, to make data appear random
- describe how Propagating Cipher Block Chaining mode improved on CBC by causing small changes to each block encrypted
- describe the Cipher Feedback mode and how it builds on CBC and makes a block cipher into a stream cipher
- describe the Output Feedback mode and how it can use the same process for encryption and decryption
- describe the Counter mode and how It can be used for parallelizing encryption and decryption
- use a simple AES implementation to encrypt and decrypt data and compare the results to the NIST standard to confirm operation of the algorithm
- describe how the DES and 3DES algorithms work to encrypt and decrypt data
- describe the Blowfish block cipher algorithm and its properties
- describe the RC4 streaming cipher and its properties
- describe the ElGamal cipher algorithm and its usage
- describe the RSA public-key encryption and its operation
- describe the deprecated MD5 and SHA1 algorithms and the newly chosen replacement, SHA3
- apply and describe the operation of the SHA2 hashing algorithms
- describe the Hash Message Authentication Code, or HMAC, and its use to authenticate and verify the integrity of a message
- identify and describe basic key management policies and procedures
- describe how to cryptographically exchange keys securely
- identify the role and purpose of key escrow policies and procedures
- identify web browser-based secure communications and the role of certificates and Certificate Authorities (CAs)
- describe of use of SSL and TLS in security tools like the Secure Shell, or SSH
- use GPG to encrypt and decrypt an e-mail message
- describe how disk encryption works and the threats it can help protect against
- identify the features and strengths of cryptographic algorithms and how to select an algorithm for a particular usage scenario
- perform some basic cryptanalysis and describe methods to decrypt poorly encrypted data
- identify external methods that can be used to compromise, or bypass, a cryptographic system
- apply cryptographic modes and algorithms
Course options
We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.
Optional practice exam (trial exam)
To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam.
Optional practice lab
To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediately. The lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience.
Sign In
WHY_ICTTRAININGEN
Via ons opleidingsconcept bespaar je tot 80% op trainingen
Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo
Spar met medecursisten en profileer je als autoriteit in je vakgebied.
Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl
Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers
Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten
Orderproces
Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.
read more about the order process
Een zakelijk account aanmaken
Wanneer u besteld namens uw bedrijf doet u er goed aan om aan zakelijk account bij ons aan te maken. Tijdens het registratieproces kunt u hiervoor kiezen. U heeft vervolgens de mogelijkheden om de bedrijfsgegevens in te voeren, een referentie en een afwijkend factuuradres toe te voegen.
Betaalmogelijkheden
U heeft bij ons diverse betaalmogelijkheden. Bij alle betaalopties ontvangt u sowieso een factuur na de bestelling. Gaat uw werkgever betalen, dan kiest u voor betaling per factuur.
Cursisten aanmaken
Als u een zakelijk account heeft aangemaakt dan heeft u de optie om cursisten/medewerkers aan te maken onder uw account. Als u dus meerdere trainingen koopt, kunt u cursisten aanmaken en deze vervolgens uitdelen aan uw collega’s. De cursisten krijgen een e-mail met inloggegevens wanneer zij worden aangemaakt en wanneer zij een training hebben gekregen.
Voortgangsinformatie
Met een zakelijk account bent u automatisch beheerder van uw organisatie en kunt u naast cursisten ook managers aanmaken. Beheerders en managers kunnen tevens voortgang inzien van alle cursisten binnen uw organisatie.
What is included?
Certificate of participation | Yes |
Monitor Progress | Yes |
Award Winning E-learning | Yes |
Mobile ready | Yes |
Sharing knowledge | Unlimited access to our IT professionals community |
Study advice | Our consultants are here for you to advice about your study career and options |
Study materials | Certified teachers with in depth knowledge about the subject. |
Service | World's best service |
Platform
Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.
FAQ
Niet gevonden wat je zocht? Bekijk alle vragen of neem contact op.