Course description
Cryptography is a vital part of cyber security. Cryptography is a set of techniques that enable security and trust by providing confidentiality, authentication, and data integrity. Many secure applications and protocols rely on combinations of properly applied and supported cryptographic techniques, from protecting personal and commercial information using encryption, to e-commerce, secure communication, IoT and network security. This crypto course develops in a progressive way an overall understanding of cryptography. It adopts a generic approach to build a core competence that can be taken away and readily applied to many different products, systems and architectures. The course covers all of the main cryptographic techniques, including their different functions and characteristics, how they are properly applied, and how they work together to achieve different security objectives. Enable the students to learn fundamental concepts of computer security and cryptography and utilize these techniques in computing systems. Scholars will gain knowledge of experimental methodologies to identify, formulate, and solve engineering problems. This Course effectively applies in their discipline of practice, and will continue their education through graduate/professional studies and/or participation in professional seminars and societies. Utilize their training and experience in creative and design processes toward their job functions. The Data Protection Act (DPA) protects the privacy and integrity of data held on individuals by businesses and other organizations. The act ensures that individuals (customers and employees) have access to their data and can correct it, if necessary.
Course outcomes
Upon the completion of this course, students will be able to:
• Understand the basics of cryptology, including historical uses, mathematical basis, types and examples of cryptography, and practical considerations for implementation
• Conceive network fundamentals and security, including network topologies, protocols, address conservation, naming, network services, and network threats and countermeasures
• Learn several models of access control, both at a theoretical and practical level
• Realize the common practices and be able to cite some common approaches to risk management and analysis
• Describe data protection concepts
Course contents
Click the down arrow icon [ 🔽 ] to expand and collapse the course topics.
🔽 0 h 59 min | Introduction to Cryptography
- Types of ciphers
- Data security
- Cryptographic systems
🔽 1 h 31 min | Cryptographic Techniques Review
- Cryptographic tools
- Public key cryptography
🔽 0 h 40 min | Network Security Technologies
- Firewall
- Intrusion detection and prevention system
- IDPS – detection technologies
- Security information and event management
- HONEYPOT
🔽 0 h 43 min | Network Security – Controls and Best Practices
- Network infrastructure security best practices
- Secure the network infrastructure edge
- Network policy enforcement
- Switching infrastructure security
- Critical security controls
🔽 0 h 43 min | Data Center Security
- Securing the data centre
- Best practices in the data centre
🔽 0 h 42 min | Securing Information Technology Infrastructure Services
- Web servers security
- Email security
🔽 0 h 27 min | Web Application Security
- Web application security versus perimeter security
- Attack surface
🔽 0 h 40 min | Introduction to Secure Protocols
- Secure HTTP
- S/MIME
- Pretty Good Privacy (PGP)
- Secure Sockets Layer (SSL)
- Transport layer security
- The handshake protocol
- IPSec
- The IP datagram
- Secure Shell (SSH)
- Mailing protocols
This course includes:
6 h 24 min recorded video
Downloadable resources (books and articles)
One year access
Access on mobile and TV
Advanced Level
Certificate of completion