Overview
This course covers the basis of symmetric key and public key cryptography and cryptographic hash functions. It applies the cryptographic techniques in the design of internet protocols that achieve crucial security properties of confidentiality, authenticity, and message integrity, against powerful but realistic eavesdropping, impersonation, man-in-the-middle and playback attacks.
Participants will learn important internet security services such as secure emails, secure transport (SSL/TLS) and virtual private network (VPN). Participants will also have a chance to apply C/Java software tools/modules towards implementing secure internet software.
IT professionals, engineers, or technical managers will gain a broad and practical understanding of major security threats in the internet and corresponding defenses against these threats. They will also acquire skills to conceptualise, design, and implement secure network applications.
Course details
For information on upcoming course dates or to register your interest, please click on [Apply / Register interest].
Duration: 2 days, 9.00AM – 5.00PM
Who should attend
IT professionals, engineers, or technical managers who need to understand the security pitfalls of internet applications, or design, implement, or manage network applications that are secure and resilient against attacks. Engineering and technology-minded internet users interested in learning the security (or lack of it) of their applications.
Prerequisites
Basic knowledge of C or Java programming.
Items to bring along for the course
Laptop that runs Unix or Linux OS in native or virtualisation mode.