Cryptography
Business Benefits:
- A team trained in information classification and protection principles
- Ensuring the appropriate confidentiality level for each object
- Increased awareness in selecting appropriate cryptographic algorithms
- Optimization of cybersecurity and functionality related to information security
Participant Benefits:
-
Skills in efficiently locating and classifying information
-
Ability to ensure proper levels of data confidentiality
-
Understanding the weaknesses and types of attacks on cryptographic algorithms
-
Ability to select appropriate cryptographic mechanisms for specific goals
Sample Agenda:
- Core Definitions: encryption, hashing, digital signature, key exchange algorithms, and more
- Using Encryption to Ensure Confidentiality
- SSL/TLS – Anatomy of Operation
- Using Hashing to Ensure Data Integrity
- Password Hashing
- Differences in hashing algorithms
- Hashing weaknesses
- Practical Use of Digital Signatures
- Cryptanalysis Attacks
- Birthday attack
- Entropy analysis of PRNGs
- Hacker Attacks on Cryptographic Mechanisms
Our Trainers:
- Rafał Gołębiowski – Head of Security
- Bartłomiej Wierzbiński – Pentester
Additional information
Duration | 2 days (14 hours) |
---|---|
Format | Exercises, Lectures, Presentations |
Language | English, Polish |
Level | Advanced, Beginner, Intermediate |
Tell us about your challenge, and we will find the right solution.
Fill out the contact form
Contact details
