Use the Cryptography and Network Security course and lab to learn about cryptography and cryptanalysis. The lab provides a hands-on learning experience in a safe and online environment. The online cryptography course and lab provide an understanding of the algorithms used to protect users online. It covers topics like identity-based encryption, attribute-based encryption, functional encryption, two-party/multi-party computation, bitcoin and crypto-currency, and post-quantum cryptography.

starstarstarstarstar_half

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

Use the Cryptography and Network Security course and lab to learn about cryptography and cryptanalysis. The lab provides a hands-on learning experience in a safe and online environment. The online cryptography course and lab provide an understanding of the algorithms used to protect users online. It covers topics like identity-based encryption, attribute-based encryption, functional encryption, two-party/multi-party computation, bitcoin and crypto-currency, and post-quantum cryptography.

1
  • Information and Network Security Concepts

  • Cybersecurity, Information Security, and Network Security
    The OSI Security Architecture
    Security Attacks
    Security Services
    Security Mechanisms
    Cryptography
    Network Security
    Trust and Trustworthiness
    Standards

2
  • Introduction to Number Theory

  • Divisibility and The Division Algorithm
    The Euclidean Algorithm
    Modular Arithmetic
    Prime Numbers4
    Fermat’s and Euler’s Theorems
    Testing for Primality
    The Chinese Remainder Theorem
    Discrete Logarithms
    Appendix 2A: The Meaning of Mod

3
  • Classical Encryption Techniques

  • Symmetric Cipher Model
    Substitution Techniques
    Transposition Techniques

4
  • Block Ciphers and the Data Encryption Standard

  • Traditional Block Cipher Structure
    The Data Encryption Standard
    A DES Example
    The Strength of DES
    Block Cipher Design Principles

5
  • Finite Fields

  • Groups
    Rings
    Fields
    Finite Fields of the Form GF(p)
    Polynomial Arithmetic
    Finite Fields of the Form GF (2n)

6
  • Advanced Encryption Standard

  • Finite Field Arithmetic
    AES Structure
    AES Transformation Functions
    AES Key Expansion
    An AES Example
    AES Implementation
    Appendix 6A: Polynomials with Coefficients in GF(28)

7
  • Block Cipher Operation

  • Multiple Encryption and Triple DES
    Electronic CodeBook
    Cipher Block Chaining Mode
    Cipher Feedback Mode
    Output Feedback Mode
    Counter Mode
    XTS-AES Mode for Block-Oriented Storage Devices
    Format-Preserving Encryption

8
  • Random Bit Generation and Stream Ciphers

  • Principles of Pseudorandom Number Generation
    Pseudorandom Number Generators
    Pseudorandom Number Generation Using a Block Cipher
    Stream Ciphers
    RC4
    Stream Ciphers Using Feedback Shift Registers
    True Random Number Generators

9
  • Public-Key Cryptography and RSA

  • Principles of Public-Key Cryptosystems
    The RSA Algorithm

10
  • Other Public-Key Cryptosystems

  • Diffie–Hellman Key Exchange
    Elgamal Cryptographic System
    Elliptic Curve Arithmetic
    Elliptic Curve Cryptography

11
  • Cryptographic Hash Functions

  • Applications of Cryptographic Hash Functions
    Two Simple Hash Functions
    Requirements and Security
    Secure Hash Algorithm (SHA)
    SHA-3

12
  • Message Authentication Codes

  • Message Authentication Requirements
    Message Authentication Functions
    Requirements for Message Authentication Codes
    Security of MACs
    MACs Based on Hash Functions: HMAC
    MACs Based on Block Ciphers: DAA and CMAC
    Authenticated Encryption: CCM and GCM
    Key Wrapping
    Pseudorandom Number Generation Using Hash Functions and MACs

13
  • Digital Signatures

  • Digital Signatures
    Elgamal Digital Signature Scheme
    Schnorr Digital Signature Scheme
    Nist Digital Signature Algorithm
    Elliptic Curve Digital Signature Algorithm
    RSA-PSS Digital Signature Algorithm

14
  • Lightweight Cryptography and Post-Quantum Cryptography

  • Lightweight Cryptography Concepts
    Lightweight Cryptographic Algorithms
    Post-Quantum Cryptography Concepts
    Post-Quantum Cryptographic Algorithms

15
  • Cryptographic Key Management and Distribution

  • Symmetric Key Distribution Using Symmetric Encryption
    Symmetric Key Distribution Using Asymmetric Encryption
    Distribution of Public Keys
    X.509 Certificates
    Public-Key Infrastructure

16
  • User Authentication

  • Remote User-Authentication Principles
    Remote User-Authentication Using Symmetric Encryption
    Kerberos
    Remote User-Authentication Using Asymmetric Encryption
    Federated Identity Management

17
  • Transport-Level Security

  • Web Security Considerations
    Transport Layer Security
    HTTPS
    Secure Shell (SSH)

18
  • Wireless Network Security

  • Wireless Security
    Mobile Device Security
    IEEE 802.11 Wireless LAN Overview
    IEEE 802.11i Wireless LAN Security

19
  • Electronic Mail Security

  • Internet Mail Architecture
    Email Formats
    Email Threats and Comprehensive Email Security
    S/MIME
    DNSSEC
    DNS-Based Authentication of Named Entities
    Sender Policy Framework
    Domainkeys Identified Mail
    Domain-Based Message Authentication, Reporting, and Conformance

20
  • IP Security

  • IP Security Overview
    IP Security Policy
    Encapsulating Security Payload
    Combining Security Associations
    Internet Key Exchange

21
  • Network Endpoint Security

  • Firewalls
    Intrusion Detection Systems
    Malicious Software
    Distributed Denial of Service Attacks

22
  • Cloud Security

  • Cloud Computing
    Cloud Security Concepts
    Cloud Security Risks and Countermeasures
    Cloud Security as a Service
    An Open-Source Cloud Security Module

23
  • Internet of Things (IoT) Security

  • The Internet of Things
    IoT Security Concepts and Objectives
    An Open-Source IoT Security Module

24
  • Appendix A: Basic Concepts from Linear Algebra

  • A.1 Operations on Vectors and Matrices
    A.2 Linear Algebra Operations Over Zn

25
  • Appendix B: Measures of Secrecy and Security

  • B.1 Conditional Probability
    B.2 Perfect Secrecy
    B.3 Information and Entropy
    B.4 Entropy and Secrecy
    B.5 Min-Entropy

26
  • Appendix C:

  • Data Encryption Standard

27
  • Appendix D: Simplified AES

  • D.1 Overview
    D.2 S-AES Encryption and Decryption
    D.3 Key Expansion
    D.4 The S-box
    D.5 S-AES Structure

28
  • Appendix E: Mathematical Basis of the Birthday Attack

  • E.1 Related Problem
    E.2 The Birthday Paradox
    E.3 Useful Inequality
    E.4 The General Case of Duplications
    E.5 Overlap Between Two Sets

Audience

Security professionals who wish to explore cryptography will benefot from this course.

Language

English

Prerequisites

While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training.

Length: 365.0 days ( hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...