Cryptography is a vital part of cyber security.
Cryptography is a set of techniques that enable security and trust by providing confidentiality, authentication, and data integrity. Many secure applications and protocols rely on combinations of properly applied and supported cryptographic techniques, from protecting personal and commercial information using encryption, to e‑commerce, secure communication, IoT and network security.
This course develops in a progressive way an overall understanding of cryptographic techniques and how they work together to achieve different security objectives. It adopts a generic approach to establish a core competence that can be taken away and readily applied to many different scenarios.
The course covers all of the main cryptographic techniques, including their different functions and characteristics, how they are properly applied, and how they work together to achieve different security objectives. The course then looks at a subject vital to the effective use of such techniques, namely cryptographic key management. This encompasses the whole key life cycle, including digital certificates and PKI.
Finally, the course looks at two examples of applied cryptography. The first is network security, with a focus on the Transport Layer Security (TLS) protocol and its predecessor SSL. The second is Blockchain. This includes describing what they do, how they work from a cryptographic perspective, and what is required for them to be effective.
The course assumes no prior knowledge and includes the following:
About the Course Presenter
All courses are delivered by the course author, Dr Mark Blunden.
Mark has a PhD in cryptography, with over twenty years of accumulated knowledge of cryptography and related areas, and fifteen years experience in delivering training.
Who Should Attend
Anyone with a need to know or interest in cryptography, key management, network security or Blockchain, such as:
The course is available for onsite delivery, and as an open scheduled course.