Notice: Undefined offset: 1 in /home3/howtoome/public_html/wp-content/themes/DT/framework/class/class_core.php on line 4346

Notice: Undefined offset: 1 in /home3/howtoome/public_html/wp-content/themes/DT/framework/class/class_core.php on line 4348

Notice: Trying to get property of non-object in /home3/howtoome/public_html/wp-content/themes/DT/framework/class/class_core.php on line 4248
Cyber Security: Applied Cryptography & Key Management - UK Training Course Directory UK Training Course Directory

Notice: Trying to get property of non-object in /home3/howtoome/public_html/wp-content/themes/DT/framework/class/class_shortcodes.php on line 1805

Notice: Trying to get property of non-object in /home3/howtoome/public_html/wp-content/themes/DT/framework/class/class_shortcodes.php on line 1830

Notice: Undefined index: class in /home3/howtoome/public_html/wp-content/themes/DT/framework/class/class_media.php on line 585

Notice: Trying to get property of non-object in /home3/howtoome/public_html/wp-content/themes/DT/framework/class/class_shortcodes.php on line 2736

Dursley 0330 223 4381
Visit Website Add Favorites .
kryptosec1.jpg


Cryptography is a vital part of cyber security.

Cryptography is a set of techniques that enable security and trust by providing confidentiality, authentication, and data integrity. Many secure applications and protocols rely on combinations of properly applied and supported cryptographic techniques, from protecting personal and commercial information using encryption, to e commerce, secure communication, IoT and network security.

This course develops in a progressive way an overall understanding of cryptographic techniques and how they work together to achieve different security objectives. It adopts a generic approach to establish a core competence that can be taken away and readily applied to many different scenarios.

The course covers all of the main cryptographic techniques, including their different functions and characteristics, how they are properly applied, and how they work together to achieve different security objectives. The course then looks at a subject vital to the effective use of such techniques, namely cryptographic key management. This encompasses the whole key life cycle, including digital certificates and PKI.

Finally, the course looks at two examples of applied cryptography. The first is network security, with a focus on the Transport Layer Security (TLS) protocol and its predecessor SSL. The second is Blockchain. This includes describing what they do, how they work from a cryptographic perspective, and what is required for them to be effective.

Course Objectives
– Develop a broad knowledge that can be applied across many different security applications that use cryptographic processes
– Establish a solid foundation on which to make judgements or assessments of secure systems
– Appreciate the different key management options and requirements necessary for the use of cryptographic techniques to be truly effective and appropriate
– Applications: develop knowledge of applied cryptography using TLS and Blockchain as examples:
– For TLS: its purpose and scope, how it works, its requirements – including certificate options – and ciphersuites
– For Blockchain: recognise what it does, how it works and its implications

Course Description

The course assumes no prior knowledge and includes the following:
– Cryptographic services
– Design principles
– Cipher types and characteristics
– Symmetric ciphers and encryption: provably secure encryption; stream ciphers; block ciphers (including DES and AES); modes of operation (such as CBC and GCM); Message Authentication Codes (MACs)
– Public key systems, including Diffie-Hellman and RSA
– Hash functions, zero-knowledge protocols, homomorphic encryption, Elliptic Curve Systems, user authentication
– Digital Signatures
– Key management, including generation, distribution, storage, PKI and certificates
– Transport Layer Security (TLS): purpose and scope; how it works; requirements, including certificate options; configuration options such as ciphersuites
– Blockchain: what it is and how it works; its implications; cryptographic properties and strengths, ZKsnarks

About the Course Presenter: All courses are delivered by the course author, Dr Mark Blunden. Mark has a PhD in cryptography, with over twenty years of accumulated knowledge of cryptography and related areas, and fifteen years experience in delivering training.

Who Should Attend

Anyone with a need to know or interest in cryptography, key management, network security or Blockchain, such as:
– Those with some familiarity with cryptography and key management who wish to broaden their knowledge and gain a perspective over the entire subject
– Security engineers
– Those responsible for implementing security functions, or for developing secure applications and architecture
– Those with responsibility for managing, assessing or defining policy for cyber security and new applications
– Application developers
– Those already familiar with network security or Blockchain who wish to use this familiarity as a springboard to learn more about cryptography

Course Style: Face-to-face

Course Availability: The course is available for onsite delivery, and as an open scheduled course.


Course Provider Kryptosec
Course Fee £2550 for onsite
Course Delivery face-to-face
Course Duration 2 days
Website Link Training Providers Website
Phone Number 0330 223 4381
Country United Kingdom
State/Province England
distance: 533 Miles
Address Dursley
Category
Keywords                
No Feedback Received