Cryptography

Cryptography is the study of secure communication techniques. You are likely to be using some form of cryptography every day. Even the device you used to login to view this course is using cryptographic techniques in the form of a one-way hash function – that protects your password. When you buy something on the internet, you are using various cryptographic principles including public key cryptography to set up the encrypted network connection between you and the vendor and a symmetric key algorithm to finish your transaction. In our modern world, so much of cryptography that is in use is invisible, just like the examples above. This wasn’t always the case.
· August 25, 2021
Course
Materials

This course is divided into three modules, each introducing you to new cryptographic concepts which are then followed up with our practical labs. In the first module you will learn about the the evolution of Cryptography, the difference between encoding and encryption and we will introduce you to the different classes of cryptographic ciphers in use today. We will then highlight the key characteristics of cryptographic techniques (Privacy, Authentication, Integrity and Non-Repudiation) before we introduce you to the first of three core cryptographic algorithms; symmetric encryption.

The second module is designed to complement your understanding of symmetric encryption by introducing you to the concept of public key cryptography. You will learn about the key features differentiating symmetric and asymmetric encryption, including their inherent advantages and disadvantages. From here you will learn about the concept of hashing algorithms and understand it’s key properties and how it is used to provide data integrity. The last section of this module will cover the concept of digital signatures, including how they are used to overcome the issue of authentication. We will then expand on one of the most critical components of authentication, by examining the features of a robust and secure password. You will be given tips on the latest password recommendations and associated strategies to ensure your authentication process is secure.

The final module will give you an introduction into how cryptography is applied in our modern world. You will learn about the art of Steganography and be encouraged to apply these concepts on the command line. We will then highlight how data is kept secure as we communicate in the modern digital landscape. The course will conclude by looking at some of the most common cryptographic attacks being used today.

Course material is only available to enrolled students.

Virtual Lab System Requirements

Although it is not a requirement to complete this course, applying the theory component of the course in our virtual labs is strongly encouraged. Most modern PC’s and Apple computers (purchased within the last 5 years) should meet the system specifications required to run the lab environment.

To participate in the virtual lab environment please ensure your computer meets our minimum system specifications:

Tablets, Mobile devices, and Netbooks are not suitable.

Operating System: Windows 10 or MacOS Sierra (or above).
Processor: Minimum AMD Ryzen 5 or Intel i5 processor or newer required.
Memory: Minimum 8GB of RAM required – 16GB RAM preferable with a 64bit dual core processor.
Storage: Minimum 50GB free disk space.

Note: Your computer must be compatible with virtualization technology.

To check if your PC has virtualization capability refer to this article HERE

To check if your MAC has virtualization capability refer to this article HERE

Linux computers will not be able to support our Virtual Lab environment.

Apply M1 computers do not currently support virtualization technology and are not suitable.  

Any computers known to have overheating issues are not permitted.

If your device does not meet our local device system requirements – please purchase our browser-based challenge labs for an alternative hands on training experience.

Course Content

Expand All
THE ESSENTIALS OF CRYPTOGRAPGHY
Lesson Content
ASYMMETRIC KEYS, HASHING ALGORITHMS AND DIGITAL SIGNATURES
APPLICATIONS OF MODERN CRYPTOGRAPHY
Not Enrolled

Course Includes

  • 23 Lessons
  • 12 Topics
  • 10 Quizzes
  • Course Certificate
error: