In a contemporary society where trove of sensitive data is constantly being generated, processed and transmitted via multiple media, it is important to protect this data by protecting properties such as confidentiality and integrity of these data when either in transit or at rest.
In this 2-day course, we start our journey with historical cryptographic techniques, and build up to their modern counterpart which are built on mathematical definitions and which form the core of most security measures implemented in secure internet communication, online banking and social media activities.
The goal of this course is to give the participants a basic understanding of the cryptographic concepts and how they are used in practical applications, the associated risks and other advancements.
This will include practice and gain knowledge through several exercises in which participants apply these cryptographic techniques and find out what could go wrong. To see how the mathematical concepts are applied in practice, the participants work through several scenarios (such as data encryption and VPN access) and learn how these concepts are applied to everyday problems.
- Security managers
- Risk managers
- IT security professionals
- IT auditors
- Security officers
..that are interested in learning about the wide spread practical use of cryptography, risks and practical implementations, and how to approach secure implementation of solutions using cryptography tools and keys.
- Module A:
- Introduction to cryptography and concept of security
- Historical and modern ciphers
- One way functions and hash algorithms
- Block ciphers and modes of operation
- Module B:
- Public Key cryptography and application in secure web surfing
- Key distribution (generating public keys and managing these keys during its lifespan)
- Certificate management
- Module C:
- Authentication Schemes and Protocols (Kerberos, WPA, WEP, VPN etc.)
- Public Key Infrastructure (PKI)
- Data Encryption
- Key Management
- Module D:
- Privacy Enhancing Techniques (PETs)
- Homomorphic Encryption and Multi-Party Computation
- Blockchain Technology
- Quantum Computing and Cryptography
Practical exercises and examples are being given throughout the course.
Until four weeks before the start of the course you may cancel your participation by email free of charge. Should you cancel within four weeks before the start of the course you will have to pay the full course fee.
Deloitte reserves the right to cancel a course if circumstances dictate. You will be informed of this as soon as possible.
For more information about our Terms and Conditions, please refer to our FAQ page.
We provide a safe learning environment in close collaboration with the locations. We carry out our services in accordance with the applicable advice and measures as determined by the RIVM. The number of participants per training remains limited, taking into account the capacity of the rooms so that keeping a safe distance is guaranteed. Participants in the training are requested to observe the prescribed hygiene measures and to stay at home if you have a cold or if you have inmates with a fever.
For further information, please refer to the CoronaCheck website of the central government.
Do you have any complaints? Please contact us and have yourself tested. Via Deloitte we can provide a voucher with which you can have an antigen test (a rapid test) taken at 70 locations in the Netherlands, free of charge.
Ik ben verantwoordelijk voor Learning in het Cyber Risk team. In deze rol ben ik verantwoordelijk om de ultieme learning expercience te creëren voor onze interne professionals. Daarnaast ben ik verantwoordelijk voor de Cyber trainingen die wij aan onze klanten of potentiële klaten aanbieden. Naast learning & development is het coachen van mensen mijn tweede passie. Ik ben dan ook een gecertificeerd coach op het gebied van work/life balance & career coaching.