Overview

This course covers the basis of symmetric key and public key cryptography and cryptographic hash functions. It applies the cryptographic techniques in the design of internet protocols that achieve crucial security properties of confidentiality, authenticity, and message integrity, against powerful but realistic eavesdropping, impersonation, man-in-the-middle and playback attacks.

 

Participants will learn important internet security services such as secure emails, secure transport (SSL/TLS) and virtual private network (VPN). Participants will also have a chance to apply C/Java software tools/modules towards implementing secure internet software.

 

IT professionals, engineers, or technical managers will gain a broad and practical understanding of major security threats in the internet and corresponding defenses against these threats. They will also acquire skills to conceptualise, design, and implement secure network applications.

Course details

For information on upcoming course dates or to register your interest, please click on [Apply / Register interest].

 

Duration: 2 days, 9.00AM – 5.00PM

Who should attend 

IT professionals, engineers, or technical managers who need to understand the security pitfalls of internet applications, or design, implement, or manage network applications that are secure and resilient against attacks. Engineering and technology-minded internet users interested in learning the security (or lack of it) of their applications.

Prerequisites

Basic knowledge of C or Java programming.

Items to bring along for the course

Laptop that runs Unix or Linux OS in native or virtualisation mode.

What’s next

Find out more

Mailing list

Subscribe to our mailing list and learn about the latest developments in SUTD Academy.

Get in touch

Submit an enquiry or schedule a call with our friendly team at +65 6499 7171.