Cryptography for Cybersecurity Practitioners
Overlap: ICS 483. Note: Students are responsible to both be aware of and abide by prerequisites for ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.First day attendance is mandatory.
This course provides students with a thorough foundation of applied cryptography for cybersecurity practitioners. As encryption technologies continue to integrate into everyday culture, the importance of cryptography and encryption knowledge of cybersecurity practitioners continues to increase.
Students will learn and be able to apply and analyze: the history of cryptography from the earliest ciphers to current encryption methodology, mathematical foundations for cryptography, symmetric and asymmetric algorithms, and applied cryptography pertaining to Virtual Private Networks (VPNs), SSL/TLS, strategies for defense utilizing encryption and cryptography, military applications, steganography, cryptanalysis, and more. Additionally, students will look to the future of cryptography and encryption including a look into quantum cryptography and encryption in cloud environments.
- Analyze the evolution of cryptography from the earliest known ciphers to present day encryption techniques
- Apply mathematical foundations of cryptography
- Interpret and use symmetric cryptography principles and encryption techniques such as Feistel networks, Substitution-Permutation Networks, S-Box design, and Cryptographic Hashes
- Interpret and use asymmetric cryptography principles and encryption techniques such as Elliptic Curve Cryptography and common Asymmetric algorithms such as RSA, Diffie-Hellman, and Digital Certificates
- Dissect applied cryptography in military applications, SSL/TLS, Virtual Private Networks (VPNs), Steganography, Cryptanalysis, Cryptographic backdoors
- Examine, compare, and architect defense strategies using encryption and cryptography principles
- Identify and make sense of attacks on encryption and how they impact the principles of Confidentiality, Integrity, and Availability
- Model how malicious threat actors use encryption to bypass common defense techniques
- Illustrate the most likely future of cryptography including quantum cryptography and cryptography in cloud environments