CYBR 432 Cryptography for Cybersecurity Practitioners
In today's rapidly evolving digital landscape, cryptography is fundamental to securing sensitive information, protecting communications, and maintaining data integrity. This course provides a comprehensive foundation in applied cryptography, covering the historical evolution, mathematical principles, encryption techniques, and real-world implementations of cryptographic security. Students will explore symmetric and asymmetric encryption methods, including Feistel networks, S-Box design, RSA, Diffie-Hellman, and Elliptic Curve Cryptography, while also applying cryptographic principles to security technologies such as SSL/TLS, Virtual Private Networks (VPNs), and military-grade encryption. The course delves into cryptanalysis techniques to assess cryptographic vulnerabilities and adversarial attack methods used to bypass encryption defenses. Additionally, students will evaluate the future of cryptography, including quantum-resistant encryption, cloud-based cryptographic applications, and emerging defense strategies. By aligning with EC-Council Certified Encryption Specialist (ECES) objectives, this course equips students with the practical skills and theoretical knowledge necessary to implement and analyze encryption solutions in cybersecurity operations. Overlap: ICS 483.
First day attendance is mandatory.
Formerly: ICS 483. Note: Students are responsible to both be aware of and abide by prerequisites for CFS/CYBR/ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
Prerequisites
Special information
Formerly: ICS 483. Note: Students are responsible to both be aware of and abide by prerequisites for CFS/CYBR/ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Undergraduate credits
Effective May 6, 2020 to present
Learning outcomes
General
- Analyze the historical evolution of cryptography, tracing its development from early ciphers to modern encryption techniques and their cybersecurity applications.
- Apply mathematical foundations to understand, implement, and evaluate cryptographic algorithms in security applications.
- Implement and assess symmetric and asymmetric encryption methods, including Feistel networks, S-Box design, RSA, Diffie-Hellman, and Elliptic Curve Cryptography.
- Examine and evaluate the role of applied cryptography in security technologies, such as SSL/TLS, Virtual Private Networks (VPNs), cryptanalysis, and military applications.
- Identify and critique cryptographic vulnerabilities, analyzing encryption attacks and their impact on Confidentiality, Integrity, and Availability (CIA).
- Investigate and model how threat actors exploit cryptographic techniques to evade detection and compromise security defenses.
- Assess and predict the future of cryptography, including quantum-resistant encryption, cryptographic applications in cloud environments, and evolving cybersecurity defense strategies.
- Evaluate and justify ethical considerations in cryptographic practices, including lawful encryption policies, privacy rights, and responsible cryptographic research.
Spring 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
50 | Cryptography for Cybersecurity Practitioners | Rabieh, Khaled | Books for CYBR-432-50 Spring 2025 | Course details for CYBR-432-50 Spring 2025 |
Summer 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
50 | Cryptography for Cybersecurity Practitioners | Rabieh, Khaled | Books for CYBR-432-50 Summer 2025 | Course details for CYBR-432-50 Summer 2025 |
Fall 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
01 | Cryptography for Cybersecurity Practitioners | Rabieh, Khaled | Books for CYBR-432-01 Fall 2025 | Course details for CYBR-432-01 Fall 2025 |