Crypto Library Programming and the PKI
CL-CLP
Onsite / Virtual classroom
3
days
Ends with an exam
Audience:
Developers
Preparedness:
General C/C++ development
Exercises:
Hands-on
Upcoming dates:

Stay tuned for more!

Course description

Today, cryptography protects the confidentiality and integrity of data in all states. Modern cryptographic functions are provided by well-established libraries, one of which is OpenSSL. It is imperative to understand how the pieces fit together, as misusing them can completely nullify the protections applied.

This course explores practical cryptography from the ground up, combining theory, practice using OpenSSL, and real-life case studies. First, we define secure-communication requirements (e.g. confidentiality, integrity) and transition into cryptographic primitives and their properties. Participants learn about symmetric encryption modes, hashing, message authentication codes (MACs), and correct usage. Next, asymmetric encryption is introduced, exploring RSA, DSA, and ECC. We then see how these building blocks construct the Public Key Infrastructure (PKI), certificates, and root of trust. At last, we build the TLS protocol and examine some of its vulnerabilities.

The course is invaluable for anyone working directly or indirectly with cryptographic functions. Following the practices and recommendations in this course ensures that cryptography applied will genuinely serve its function and protect data as intended.

Outline:
  • IT security and secure coding
  • Requirements of secure communication
  • Practical cryptography
  • Asymmetric (public-key) cryptography
  • Public Key Infrastructure (PKI)
  • Improper use of cryptography
  • Security protocols
  • Cryptographic vulnerabilities
  • Principles of security and secure coding
  • Knowledge sources
Participants attending this course will:
  • Understand basic concepts of security, IT security and secure coding
  • Have a practical understanding of cryptography
  • Understand the requirements of secure communication
  • Understand essential security protocols
  • Understand some recent attacks against cryptosystems
  • Get sources and further readings on secure coding practices
AI Security
Go and Web Application Security
Application Security In The Cloud
Web Application Security Testing
Crypto Library Programming and the PKI
Advanced TPM Security
Web Application Security
C# and Web Application Secuity
Java and Web Application Security
C and C++ Secure Coding (x86)
C and C++ Secure Coding (ARM)
OWASP TOP 10, Secure Coding Fundamentals
AI for Software Developers
AI Fundamentals
Train the Trainer - Fundamentals

Our students say:

"Overall very good introduction to the topic with a good mix of information, illustrations, examples and exercises."

October 25, 2021

"Trainer was very experienced and explained in very detail. The content was very good."

October 25, 2021

"The course gives overall a good insight about the PKI Infrastructure."

October 25, 2021
Structured
flexibility
Proven model
Just in time
learning
World-class
trainers
Global trainer
alumni
network
Win together,
don’t lose
alone.
Request information
Fill out the form for personalized assistance and discover how our training programs can transform your career path.
We appreciate your interest and will get back to you shortly with all the information you need!
Oops! Something went wrong while submitting the form.
Please try again!