SCADEMY logo, back to home

Crypto Library Programming and the PKI

CL-CLP

Virtual classroom

3 days

Ends with an exam

Audience: Developers

Preparedness: General C/C++ development

Exercises: Hands-on

Crypto Library Programming and the PKI
Crypto Library Programming and the PKI

Today, cryptography protects the confidentiality and integrity of data in all states. Modern cryptographic functions are provided by well-established libraries, one of which is OpenSSL. It is imperative to understand how the pieces fit together, as misusing them can completely nullify the protections applied.

This course explores practical cryptography from the ground up, combining theory, practice using OpenSSL, and real-life case studies. First, we define secure-communication requirements (e.g. confidentiality, integrity) and transition into cryptographic primitives and their properties. Participants learn about symmetric encryption modes, hashing, message authentication codes (MACs), and correct usage. Next, asymmetric encryption is introduced, exploring RSA, DSA, and ECC. We then see how these building blocks construct the Public Key Infrastructure (PKI), certificates, and root of trust. At last, we build the TLS protocol and examine some of its vulnerabilities.

The course is invaluable for anyone working directly or indirectly with cryptographic functions. Following the practices and recommendations in this course ensures that cryptography applied will genuinely serve its function and protect data as intended.


Outline

IT security and secure coding

Requirements of secure communication

Practical cryptography

Asymmetric (public-key) cryptography

Public Key Infrastructure (PKI)

Improper use of cryptography

Security protocols

Cryptographic vulnerabilities

Principles of security and secure coding

Knowledge sources


Participants attending this course will

Understand basic concepts of security, IT security and secure coding

Have a practical understanding of cryptography

Understand the requirements of secure communication

Understand essential security protocols

Understand some recent attacks against cryptosystems

Get sources and further readings on secure coding practices




Our students say

0 of 0

Instructor-led courses
Instructor-led courses

Handle complex subjects, provide practical skills training, and hands-on experience, enable discussion and collaboration, and maintain the motivation and accountability of learners.

 Large-scale trainings
Large-scale trainings

Courses with couple of thousands of participants to be conducted in a short time frame, in any time zone, on-site or online.

Academic knowledge, practical application
Academic knowledge, practical application

Utilzing our R&D&I we combine academic knowledge with practical application, we develop and tailor courses to latest trends and clients' needs.

Proprietary platform with virtual machines
Proprietary platform with virtual machines

We use our proprietary platform with virtual machines for a safe practice, coding, and experimentation environment.

Hi SCADEMY Team,

My name isand my email is
I'd like to get more information aboutcourse for
The number of people would participate in the course
Man and woman
Find us here:

Budafoki street 187-189.
Budapest, 1117, Hungary

+36 1 205 3098

These courses could interest you, too:

Go to full course catalog

Trusted by top companies and brands:

EvosoftAirbusKnorr-BremseGE HealthCareEricssonSiemensNokiaBMW GroupLenovoConaxNAGRAAtosBeldenCode42VolvoElektrobitAXAKongsbergEvosoftAirbusKnorr-BremseGE HealthCareEricssonSiemensNokiaBMW GroupLenovoConaxNAGRAAtosBeldenCode42VolvoElektrobitAXAKongsberg