Introduction
Introduction to the course
()
1. Introduction to Cryptography
Introduction
()
Introduction to cryptography
()
Classifying cryptosystems
()
Principles of cryptography
()
2. Fundamentals of Cryptography
Introduction
()
Mathematics of cryptography
()
Structures of cryptography
()
3. Symmetric Cryptography
Introduction
()
Fundamentals of symmetric cryptography
()
Block ciphers
()
The Advanced Encryption Standard (AES)
()
Stream ciphers
()
Rivest Cipher 4 (RC4)
()
4. Asymmetric Cryptography
Introduction
()
Introduction to asymmetric cryptography
()
Rivest-Shamir-Adleman (RSA)
()
Diffie-Hellman key exchange
()
Digital signatures
()
Elliptic curve cryptography
()
5. Hash Functions
Introduction
()
Introduction to hash functions
()
Collision resistance
()
The SHA hash family
()
6. Public Key Infrastructure (PKI)
Introduction
()
Introduction to PKI
()
Security of the PKI ecosystem
()
7. SSL and TLS
Introduction to TLS/SSL
()
Attacking TLS/SSL
()
8. Virtual Private Networks (VPNs)
Introduction
()
Introduction to VPNs
()
VPN limitations
()
9. Secure Credential Management
Introduction
()
Introduction to secure credential management
()
Securely managing credentials
()
Case studies in poor password management
()
10. Full Disk Encryption
Introduction
()
Introduction to full disk encryption
()
Attacking full disk encryption
()
11. Blockchain Technology
Introduction
()
Introduction to blockchain
()
Blockchain and asymmetric cryptography
()
Blockchain and hash functions
()
12. Introduction to Cryptanalysis
Introduction
()
Introduction to cryptanalysis
()
Entropy calculations
()
Character frequency analysis
()
Encryption vs encoding
()
Breaking ROT ciphers
()
Breaking weak XOR encryption
()
Breaking misused stream ciphers
()
13. Applied Cryptanalysis
Introduction
()
TLS decryption
()
Decrypting malware command and control
()
Decrypting downloaded files
()