Cryptography Training Courses
We run 1 or 2 day cryptography training courses online and in various locations across Europe and North America. Please get in touch for latest dates. We’re also happy to run private courses for groups of up to 6 people upon request.
- How to Automate Cryptography Inventory
- Migrating Sensitive Applications to the Cloud
- Identifying and Assessing Cryptography Flaws in Applications
- Configuring and Testing your PKCS#11 Implementation
Some of the material for these courses has been delivered in short webinars, now available to watch on-demand. See our full list of available webinars.
Example Training Schedule
We tailor our cryptography training courses to suit the needs of the participants. Below you can read the example schedule for our course on Identifying and Assessing Cryptography Flaws in Applications.
All of our courses are intended for security professionals. Some basic familiarity with cryptography is required to get the most out of the training.
Cryptosense maintains strong links with the University of Venice Ca’ Foscari. Courses will be taught by Cryptosense CEO Dr. Graham Steel and Prof. Riccardo Focardi of the University of Ca’ Foscari.
Day 1 – Crypto Risk
There is no practical exercise, so up to date coding skills are not required. Training examples will be given in Java.
You will learn:
- When (not) to use crypto and why
- Mistakes to avoid in common operations and protocols
- Best practices for key-management
- Real-world examples of attacks exploiting crypto flaws to obtain secret data, achieve remote code execution, reset passwords to known values, etc.
Day 2 – Crypto Exploits
This part of the training includes practical exercises, so some coding skills are required, and familiarity with crypto APIs will help. The training examples will be given in Java, but developers with good experience of another widely-used high-level language like Python may prefer to use that. Cryptosense trainers will support Java and Python, but can’t guarantee support for more exotic languages.
You will learn:
- How to write exploits for vulnerabilities resulting from common crypto errors