cryptography-fundamental
ABOUT THE COURSE
The objective of the course is to provide a basic understanding of the various issues related to information systems security (esecurity). The course will present an overview of the risks encountered in information systems security, and the tools used for resolving these risks.
What are the reasons to use cryptographic algorithms?
When transmitting data, one does not want an eavesdropper to understand the contents of
the transmitted messages. The same is true for stored data that should be protected against
unauthorized access, for instance by hackers
Key Features
20 hours of high quality eLearning content
3 case studies
106 real world examples from various industries
Education with new technologies
Achievements in work
2 Glossaries for difficult terms & acronyms
Deliverables
Training
3 case studies
Books
CD's
Participation Certificate
Lessons
Overview of e-security
45 min
Cryptography for e-security
45 min
Key exchange (peer to peer, peer - keyserver - peer)
55 min
Symmetric key cryptography vs asymmetric key cryptography
2 hours
Properties of cryptographic hash functions
60 min
Stream ciphers vs. block ciphers
75 min
Public key encryption
75 min
RSA algorithm
75 min
Encryption using non-cryptographic tools (vi, zip)
75 min
Practical applications
75 min