Introduction to Cryptography
Prepare to master the essentials of secure communication
$1000
Duration
4 days
Study mode
Online, instructor-led
Next date
12/16/2024
gain practical skills in encryption and data security
Discover the techniques behind secure digital transactions and communications through a detailed, beginner-friendly course
This course is for you if...
✅︎ you’re an IT professional looking to enhance your skills
✅︎ you’re a business leader aiming to understand cryptography
✅︎ you’re a student or aspiring professional entering the tech industry
✅︎ you’re an entrepreneur interested in developing secure tech solutions
✅︎ you’re a government or defense representative focusing on digital security
✅︎ you’re interested in cryptocurrency
✅︎ you’re an educator in the technology field looking to expand your knowledge
✅︎ you’re anyone with any kind of interest in technology and innovation
COURSE STRUCTURE
Attend classes according to your preferred schedule (live or asynchronous).
Each lecture is enriched with real life proofs-of-concept and engaging visuals.
Practice for the exam with the help of our training assistants.
Take as much time as you need.
Whenever you feel ready, take a proctored exam to certify your mastery of the course content.
You can also submit an optional personal project and receive extensive feedback.
WHAT THE COURSE COVERS
View the full syllabus here.
1. Introduction
Introduction to telecommunications
Security objectives
Security threats
2 . Achieving Security
The adversary model
Algorithms
The security doctrine
3. Math for Cryptography
Problems and data
Computation
Basics of number theory
4. Components of Encryption
Encryption keys and algorithms
Backward and forward secrecy
5. Hash Functions
Hashing vs encryption
Rainbow tables
Hash vulnerabilities
6. Authentication
Authentication factors and systems
Password systems
Weak points and protection
7. Symmetric Encryption
Cryptoanalysis
Stream ciphers
Block ciphers
8. Cryptography Today
Modular arithmetic
Advanced Encryption Standards
Security implications
9. Key Management
Advanced number theory
Asymmetric cryptography
The RSA scheme
10. Asymmetric Encryption
Quantum computing
Shor algorithm
Digital signatures
11. The Blockchain
Distributed ledger technology
Consensus protocols
Smart contracts
12. Cryptocurrency
Mining
Transaction validation
Token standards
WHAT'S INCLUDED
✅︎ 20+ hours of live training
✅︎ Quizzes, exercises and infographics for every module
✅︎ Direct assistance from your trainer assistant
✅︎ Exclusive networking opportunities
✅︎ A final exam and certificate guaranteeing your competence in the field
✅︎ The chance to develop a personal project to showcase your abilities
✅︎ Accelerated access to the job market
© 2024 Cicada Learning LLC | Privacy Policy, Terms & Conditions