HSM and Cryptography Workshop

Learn how to use an HSM and understand the basics of cryptography, and the downloadable tool includes soft for your use.

HSM and Cryptography Workshop

Learn how to use an HSM and understand the basics of cryptography, and the downloadable tool includes soft for your use.
2K
views
Share the link to this page
Copied

About the Class

The HSM and Cryptography Workshop accelerates your understanding of cryptography and its functions through the use of the provided software HSM. It will provide critical insights and information for all the cryptographic functions like Symmetric key functionality, Asymmetric key functionality, hashing functionality, and message authentication command (MAC) functionality.

  • This workshop, unique in the industry, is perfect for a time when travel and gatherings are restricted, but you still want to increase your knowledge of the cryptography functions.
  • By the end of this workshop, you will feel confident in your understanding of the overall cryptography functions. You will gain a thorough understanding of how cryptography works.

Available 24/7 online on your phone, tablet, laptop, or desktop.

Work at your own pace – review modules as many times as you need to.

No travel is needed to attend classes. The travel costs you avoid could pay for the course.

Easily digestible modular lessons with an average of 26 slides per module.

Proprietary confidence-building hands-on labs and lab tools.

Lab tool you can use on the job.

Become conversant with the industry lingo.

Accelerate your career by applying insights based on your knowledge.

Who should take this course?

This course will be of benefit to anyone interested in understanding cryptography:

  • Software developers
  • Product managers
  • Security managers
  • Operations Manager
  • Project managers

The Typhon cryptography workshop consists of 13 modules:

  • M100 - Crypto course overview
  • M101 - Crypto foundation
  • M102 - Symmetric key intro
  • M103 - Symmetric key methods
  • M104 - Asymmetric keys
  • M105 - MAC HASH DS
  • M106 - PKI
  • M107 - Common criteria
  • M108 - FIPS
  • M150 - Lab tool installation
  • M151 - Lab on symmetric keys
  • M152 - Lab on asymmetric keys
  • M153 - Lab on MAC HASH DS

Typhon - the Wiseravens cryptography tool provided for use in the class was named for the father of Cerberus, the three-headed watchdog of Greek mythology, and provides the following functions:

  • Built-in software HSM to store your keys.
  • Interfaces with any hardware HSM that supports PKCS#11.
  • Data can be input in either ASCII or HEX.
  • Robust logging allows you to save all your work for later review.

Symmetric key functionality:

  • DES / DES2 / 3DES key generation in ECB or CBC mode.
  • AES-128 / AES-192 / AES-256 key generation in ECB or CBC mode.
  • Ability to run in Lab mode or HSM mode.
  • HSM mode allows the storage of your generated keys in the HSM.
  • Ability to encrypt and decrypt data to test key functionality.

Asymmetric key functionality:

  • Ability to create and save 512 / 1024 / 2048 / 4096-bit public/private key pairs.
  • Encryption functions allow you to encrypt with either the public or private Key.
  • Decryption functions allow you to decrypt with either the public or private Key.
  • Signing functions allow you to create digital signatures from ASCII or HEX data using.
  • MD-4 / MD-5 / SHA-1 / SHA-256 / SHA-384 / SHA-512.
  • The verification function allows you to verify the signed data.
  • The sign and verify file function allows you to sign and verify a file.

Hashing functionality:

  • Ability to create message digests using the following hashing functions.
  • MD-4 / MD-5 / SHA-1 / SHA-256 / SHA-384 / SHA-512.

Message authentication command (MAC) functionality:

  • Ability to create HMACs using any of the following hash algorithms.
  • MD-2 / MD-4 / MD-5 / SHA-1 / SHA-224 / SHA-256 / SHA-384 / SHA-512.
  • Ability to create CMACs using any of the following encryption algorithms.
  • AES-128 / AES-192 / AES-256 / TDES-CMAC / TDES-CBC-CMAC / retailMAC.

Author

Manoj Goyal

Chief Architect

School

WiseRavens

Requirements

None.

This is a free item
$0.00
د.إ0.00
Kz0.00
ARS$0.00
A$0.00
৳0.00
Лв0.00
Bs0.00
B$0.00
P0.00
CA$0.00
CHF 0.00
CLP$0.00
CN¥0.00
COP$0.00
₡0.00
Kč0.00
DKK kr0.00
RD$0.00
DA0.00
E£0.00
ብር0.00
€0.00
FJ$0.00
£0.00
Q0.00
GY$0.00
HK$0.00
L0.00
Ft0.00
₪0.00
₹0.00
ISK kr0.00
¥0.00
KSh0.00
₩0.00
DH0.00
L0.00
ден0.00
MOP$0.00
MX$0.00
RM0.00
N$0.00
₦0.00
C$0.00
NOK kr0.00
रु0.00
NZ$0.00
S/0.00
K0.00
₱0.00
₨0.00
zł0.00
₲0.00
L0.00
QR0.00
SAR0.00
SEK kr0.00
S$0.00
฿0.00
₺0.00
$U0.00
R0.00
ZK0.00

What's Included

Language: English
Level: All levels
Skills: Typhon Cryptography, Workshop, Analyzing Protocols, Cryptography
Age groups: 18-65 years
Certificate: On completion
Duration: 2 hours 11 minutes
13 Videos
1 Document
0
Saves
2K
Views
This class has not been saved

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.