Cryptography

Business Benefits:
  • A team trained in information classification and protection principles
  • Ensuring the appropriate confidentiality level for each object
  • Increased awareness in selecting appropriate cryptographic algorithms
  • Optimization of cybersecurity and functionality related to information security
Participant Benefits:
  • Skills in efficiently locating and classifying information

  • Ability to ensure proper levels of data confidentiality

  • Understanding the weaknesses and types of attacks on cryptographic algorithms

  • Ability to select appropriate cryptographic mechanisms for specific goals

Sample Agenda:
  • Core Definitions: encryption, hashing, digital signature, key exchange algorithms, and more
  • Using Encryption to Ensure Confidentiality
  • SSL/TLS – Anatomy of Operation
  • Using Hashing to Ensure Data Integrity
  • Password Hashing
    • Differences in hashing algorithms
    • Hashing weaknesses
  • Practical Use of Digital Signatures
  • Cryptanalysis Attacks
    • Birthday attack
    • Entropy analysis of PRNGs
  • Hacker Attacks on Cryptographic Mechanisms
Our Trainers:
  • Rafał Gołębiowski – Head of Security​
  • Bartłomiej Wierzbiński – Pentester

Additional information

Duration

2 days (14 hours)

Format

Exercises, Lectures, Presentations

Language

English, Polish

Level

Advanced, Beginner, Intermediate

Tell us about your challenge, and we will find the right solution.

Fill out the contact form

Contact details

TestArmy Group S.A. Petuniowa 9/5 53-238 Wrocław Poland

New Field

New Field