Skip to main content

Apply now! Spring priority deadline is October 1.

CYBR 432 Cryptography for Cybersecurity Practitioners

In today's rapidly evolving digital landscape, cryptography is fundamental to securing sensitive information, protecting communications, and maintaining data integrity. This course provides a comprehensive foundation in applied cryptography, covering the historical evolution, mathematical principles, encryption techniques, and real-world implementations of cryptographic security. Students will explore symmetric and asymmetric encryption methods, including Feistel networks, S-Box design, RSA, Diffie-Hellman, and Elliptic Curve Cryptography, while also applying cryptographic principles to security technologies such as SSL/TLS, Virtual Private Networks (VPNs), and military-grade encryption. The course delves into cryptanalysis techniques to assess cryptographic vulnerabilities and adversarial attack methods used to bypass encryption defenses. Additionally, students will evaluate the future of cryptography, including quantum-resistant encryption, cloud-based cryptographic applications, and emerging defense strategies. By aligning with EC-Council Certified Encryption Specialist (ECES) objectives, this course equips students with the practical skills and theoretical knowledge necessary to implement and analyze encryption solutions in cybersecurity operations. Overlap: ICS 483.

Prerequisites

Special information

First day attendance is mandatory.
Formerly: ICS 483. Note: Students are responsible to both be aware of and abide by prerequisites for CFS/CYBR/ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Undergraduate credits

Effective May 6, 2020 to present

Learning outcomes

General

  • Analyze the historical evolution of cryptography, tracing its development from early ciphers to modern encryption techniques and their cybersecurity applications.
  • Apply mathematical foundations to understand, implement, and evaluate cryptographic algorithms in security applications.
  • Implement and assess symmetric and asymmetric encryption methods, including Feistel networks, S-Box design, RSA, Diffie-Hellman, and Elliptic Curve Cryptography.
  • Examine and evaluate the role of applied cryptography in security technologies, such as SSL/TLS, Virtual Private Networks (VPNs), cryptanalysis, and military applications.
  • Identify and critique cryptographic vulnerabilities, analyzing encryption attacks and their impact on Confidentiality, Integrity, and Availability (CIA).
  • Investigate and model how threat actors exploit cryptographic techniques to evade detection and compromise security defenses.
  • Assess and predict the future of cryptography, including quantum-resistant encryption, cryptographic applications in cloud environments, and evolving cybersecurity defense strategies.
  • Evaluate and justify ethical considerations in cryptographic practices, including lawful encryption policies, privacy rights, and responsible cryptographic research.

Spring 2025

Section Title Instructor books eservices
50 Cryptography for Cybersecurity Practitioners Rabieh, Khaled Books for CYBR-432-50 Spring 2025 Course details for CYBR-432-50 Spring 2025

Summer 2025

Section Title Instructor books eservices
50 Cryptography for Cybersecurity Practitioners Rabieh, Khaled Books for CYBR-432-50 Summer 2025 Course details for CYBR-432-50 Summer 2025

Fall 2025

Section Title Instructor books eservices
01 Cryptography for Cybersecurity Practitioners Rabieh, Khaled Books for CYBR-432-01 Fall 2025 Course details for CYBR-432-01 Fall 2025