Understand the science of protecting data. Learn algorithms, protocols and key management to ensure confidentiality and integrity in corporate systems.
Interested in training your team with this program?
Request a Quote Buy Individual Access — $29.90Training focused on the practical and applied use of cryptography in corporate systems.
Essential concepts: symmetric algorithms (AES), asymmetric (RSA, ECC) and hash functions (SHA-256).
Public Key Infrastructure, Certificate Authorities, digital signatures and chain of trust.
TLS 1.3 handshake, cipher suites, HTTPS, VPNs (IPsec and OpenVPN) and data in transit protection.
Creating key pairs, file encryption, message signing and verification via command line.
Key lifecycle, secure storage, rotation, custody and introduction to HSM modules.
Data at rest protection, disk encryption, password managers and best practices for professionals.