KYBS2004 Authentication, passwords and applied cryptography (5 op)
Kuvaus
Summary
This course will teach the participants technologies and techniques how authentication and crypto is being broken/hacked in practice, and what are practical defence-in-depth approaches. Breaking authentication, passwords and crypto in many cybersecurity situations have far-reaching implications up to complete compromise of any system. Therefore, it is crucial that the participants who set on the professional cybersecurity career path master the background knowledge, techniques and tools that are indispensable for breaking and defending authentication, password and crypto security.
Completion methods:
Exercise Assignments, Final Report.
Course workload:
Exercise Assignment tasks: 5 * 3h = 15h
Final Report task: 10h
Online Assistance (Q&A): 5 * 2h = 10h
Self-study (includes: going over materials of 10 lectures at own-pace): 90h + 10 * 1h = 100 h
Osaamistavoitteet
Esitietojen kuvaus
Prerequisites
Pre-Requisite Basic IT Knowledge (0-20) (or equivalent)
-Basic programming skills (5 op) (or equivalent)
-Basic OS/VM skills (5 op) (or equivalent)
-Networking Skills (5 op) (or equivalent)
-Basic Cloud Computing or database skills (5 op) (or equivalent)
Must-have:
-Computer Science
-Information Technology
-Basic and Main Security Concepts
Nice-to-have:
-Linux, command-line, SSH
-VMs, docker
-Kali, OWASP Top10
-Hashing, Digital Signatures, Encryption/Decryption, Public/Private Key Crypto, Shared Key Crypto, PKI
-JohnTheRipper, Hashcat
-ITKST56