Cryptography

5 Days online

BT216 Cryptogaphy
1
Hours
1
Days
1 %
Hands-On
1
Case Studies
1
Labs

Cryptography is an indispensable tool for protecting data in computer systems. With this course, you will learn the inner workings of cryptographic systems and how to use them correctly in real-world appliations.

From ancient examples of secret messages and the spies that cracked them to modern cryptographic applications, you will have the opportunity to explore the foundations of data security.

This course is essential for:

  • Cybersecurity beginners
  • Anyone intersted in cryptography
  • Anyone curious about how how data is encrypted to be secured

Cyberium Arena

Cyberium Arena Logo
The CYBERIUM ARENA is a high-end cybersecurity Learning Management System and Simulator, which trains participants in the use of a wide variety of on-line tools for identifying the nature of a cyber attack and responding quickly and appropriately to prevent damage and disable the attacker.

Real Cases Studies

Case Study #1
Attackers use a technique that could allow them to access the entire content of a password-protected or encrypted PDF file. Small press companies suffered data exposure; the local security department was able to retrieve some of the data, but the rest of the files were encrypted.
Case Study #2
Cybersecurity researchers released an updated version of a ransomware decryption tool that could allow millions of users to unlock their encrypted files. A problem appeared when some of the files couldn’t be decrypted and needed some special knowledge in algorithms. The researchers want your help to understand some of the encryptions their tool couldn’t decrypt.
Previous
Next

Remain informed about the schedule:

More about:

The Introduction to cybersecurity course is for managers, business leaders or anyone who wants to discover the cyber world and security threats.

The Linux Introduction course is for people who want to begin with the Linux System, the most adapted for cybersecurity operations and development. Linux can be installed as a sub-system of Windows without affecting it.