Price 4,228 ILS

DURATION 2 Days

Course Overview

The course is divided to one day of overview on the crypto algorithms used for data confidentiality and data integrity and their usage, and the second day is devoted to security protocols that are using these algorithms. (Note: there is an option for a one day seminar on encryption algorithms)

Who should attend?

R&D managers and software engineers,IT security staff, security administrators ,Any technical staff interested in understanding security fundamentals

Prerequisite:

None

Course Outline:

1. Introduction (1 hours)
• Confidentiality, Data-Integrity and Non-repudiation – terminology
• Attack types
• Information security requirements

2. Encryption & Confidentiality (4-5 Hours)
• Cryptography Fundamentals
– One Time Pad
– Brute-Force attacks and key-size
• Symmetric and non symmetric encryption
• Symmetric stream ciphers
– Algorithms (RC4)
• Symmetric block ciphers
– AES algorithm
• Symmetric block encryption modes
– ECB
– CBC
– CTR
• Non-symmetric encryption
– DH Algorithm
– RSA Algorithm
• Hybrid Encryption

3. Digital Signatures and Data-Integrity (2 Hours)
• Crypto hash functions and Message Digest
• MAC (Message Authentication Code)
– HMAC
– CMAC & OMAC
• Digital signatures

4. Authenticated Encryption & GCM (1 hour)

 

5. PKI & Authentication (3-4 Hours)

• Certificates (X.509 and extensions)
• Certificate Authority
– Trusted Root CA
– Intermediate CA
• CRL
• OCSP(RFC 6960)
– OCSP Stapling

6. SSL and HTTPS (3-4 Hours)

• Perfect forward secrecy
• SSL design goals
• SSL Record Layer protocol
• SSL Handshake
• SSL Alert protocols
• SSL Cipher suites
• SSL Vesions

7. Summary