We run 1 or 2 day cryptography training courses online and in various locations across Europe and North America. Please get in touch for latest dates. We’re also happy to run private courses for groups of up to 6 people upon request.
How to Automate Cryptography Inventory
Migrating Sensitive Applications to the Cloud
Identifying and Assessing Cryptography Flaws in Applications
Configuring and Testing your PKCS#11 Implementation
Some of the material for these courses has been delivered in short webinars, now available to watch on-demand. See our full list of available webinars.
We tailor our cryptography training courses to suit the needs of the participants. Below you can read the example schedule for our course on Identifying and Assessing Cryptography Flaws in Applications.
All of our courses are intended for security professionals. Some basic familiarity with cryptography is required to get the most out of the training. Cryptosense maintains strong links with the University of Venice Ca’ Foscari. Courses will be taught by Cryptosense CEO Dr. Graham Steel and Prof. Riccardo Focardi of the University of Ca’ Foscari.
Day 1 – Crypto Risk
There is no practical exercise, so up to date coding skills are not required. Training examples will be given in Java.
You will learn:
When (not) to use crypto and why
Mistakes to avoid in common operations and protocols
Best practices for key-management
Real-world examples of attacks exploiting crypto flaws to obtain secret data, achieve remote code execution, reset passwords to known values, etc.
Day 2 – Crypto Exploits
This part of the training includes practical exercises, so some coding skills are required, and familiarity with crypto APIs will help. The training examples will be given in Java, but developers with good experience of another widely-used high-level language like Python may prefer to use that. Cryptosense trainers will support Java and Python, but can’t guarantee support for more exotic languages.
You will learn:
How to write exploits for vulnerabilities resulting from common crypto errors.