For some, perhaps, a little over exaggerated statement. But in the world of communications and increasingly more endangered safety it is important to have access to professionals aware of interconnections and relations. A business may carefully chose communications protocols or architecture, but the effort may end up in vain: Wrong choice of methods will weaken protection, allow reading or modification of transferred data or may slow down
the system and waste your investment in infrastructure. It is critical to understand that your data or data of your customers is being transmitted via a public space and the only protection is a well selected cryptography. This training will help your understanding of these relationships and will carefully prepare your technicians for the requirements set by cyber security law.
For some, perhaps, a little over exaggerated statement. But in the world of communications and increasingly more endangered safety it is important to have access to professionals aware of interconnections and relations. A business may carefully chose communications protocols or architecture, but the effort may end up in vain: Wrong choice of methods will weaken protection, allow reading or modification of transferred data or may slow down the system and waste your investment in infrastructure. It is critical to understand that your data or data of your customers is being transmitted via a public space and the only protection is a well selected cryptography. This training will help your understanding of these relationships and will carefully prepare your technicians for the requirements set by cyber security law.
Training is presented in English, technicians are the target audience. The objective is to show
basic principles and methodologies for successful implementation of technology using cryptography.
08:00 - 09:00 | Check in and Registration |
09:00 - 10:00 | Kryptology and limits in local law |
10:00 - 13:00 | Hashes, random number generators, asymmetric algorithms |
13:00 - 14:00 | Lunch |
14:00 - 17:00 | Symmetric algorithms, encryption modes, architecture of famous alogorithms and performance comparsion |
08:00 - 09:00 | Open discussion |
09:00 - 10:00 | Hardware implementation |
10:00 - 13:00 | Software implementation - SSL Layer |
13:00 - 14:00 | Lunch |
14:00 - 15:00 | Application hardening |
15:00 - 17:00 | Real life applications |
Every field marked with (*) is required
Please note that this is semniar for corporate employees only
Máte dotaz? Napište mi