In a contemporary society where trove of sensitive data is constantly being generated, processed and transmitted via multiple media, it is important to protect this data by protecting properties such as confidentiality and integrity of these data when either in transit or at rest.
In this 2-day course, we start our journey with historical cryptographic techniques, and build up to their modern counterpart which are built on mathematical definitions and which form the core of most security measures implemented in secure internet communication, online banking and social media activities.
The goal of this course is to give the participants a basic understanding of the cryptographic concepts and how they are used in practical applications, the associated risks and other advancements.
This will include practice and gain knowledge through several exercises in which participants apply these cryptographic techniques and find out what could go wrong. To see how the mathematical concepts are applied in practice, the participants work through several scenarios (such as data encryption and VPN access) and learn how these concepts are applied to everyday problems.
- Security managers
- Risk managers
- IT security professionals
- IT auditors
- Security officers
..that are interested in learning about the wide spread practical use of cryptography, risks and practical implementations, and how to approach secure implementation of solutions using cryptography tools and keys.
- Module A:
- Introduction to cryptography and concept of security
- Historical and modern ciphers
- One way functions and hash algorithms
- Block ciphers and modes of operation
- Module B:
- Public Key cryptography and application in secure web surfing
- Key distribution (generating public keys and managing these keys during its lifespan)
- Certificate management
- Module C:
- Authentication Schemes and Protocols (Kerberos, WPA, WEP, VPN etc.)
- Public Key Infrastructure (PKI)
- Data Encryption
- Key Management
- Module D:
- Privacy Enhancing Techniques (PETs)
- Homomorphic Encryption and Multi-Party Computation
- Blockchain Technology
- Quantum Computing and Cryptography
Practical exercises and examples are being given throughout the course.
Deloitte Academy is a training institute accredited by several organizations.
For more information about our accreditation, please refer to our Education hours page.
Until four weeks before the start of the course you may cancel your participation by email free of charge. Should you cancel within four weeks before the start of the course you will have to pay the full course fee.
Deloitte Academy reserves the right to cancel a course if circumstances dictate. You will be informed of this as soon as possible.
For more information about our Terms and Conditions, please refer to our FAQ page.
If you have any questions, please contact us:
Phone number: 088-288 93 33
Rolf is a manager in the Deloitte Netherlands Cyber Risk Advisory team. Rolf has completed several projects and helped (international) clients on IT security related challenges. The last few years Rolf has worked on areas such as payment security, cryptography, ICS/SCADA & IoT, performing risk analysis and project management. With a strong technical background Rolf likes to combine the technical content with the business side. Rolf likes to oversee and coordinate the whole picture and strives towards effective solutions, both from a security and usability perspective. This all combined with transferring knowledge, such as facilitating trainings and giving presentations.