KYBS2004 Authentication, passwords and applied cryptography (5 cr)
Tweet text
Description
Summary
This course will teach the participants technologies and techniques how authentication and crypto is being broken/hacked in practice, and what are practical defence-in-depth approaches.
Breaking authentication, passwords and crypto in
many cybersecurity situations have far-reaching implications up to complete
compromise of any system.
Completion methods and Course workload:
On-line course.
Exercise Assignment tasks: 5 * 3h = 15h
Final Report task: 10h
Online Assistance (Q&A): 5 * 2h = 10h
Self-study (includes going over materials of 10 lectures at own pace): 90h + 10 * 1h = 100 h
Learning outcomes
Students understood the background knowledge, techniques and tools that are indispensable for breaking and defending authentication, password, and crypto security.
Description of prerequisites
Pre-Requisite Basic IT Knowledge (0-20) (or equivalent)
- Basic programming skills (5 op) (or equivalent)
- Basic OS/VM skills (5 op) (or equivalent)
- Networking Skills (5 op) (or equivalent)
- Basic Cloud Computing or database skills (5 op) (or equivalent)
Must-have:
- Computer Science
- Information Technology
- Basic and Main Security Concepts
Nice-to-have:
- Linux, command-line, SSH
- VMs, docker
- Kali, OWASP Top10, Metasploit, Nmap, XSS, SQLi
- ITKST56