CRYPTOGRAPHY / BT216
TWO | FOUR | 75% | 16
SCENARIOS LABS HANDS-ON DURATION
Cryptography is an indispensable tool for protecting information in computer systems. In this course, you will learn the inner workings of cryptographic systems and how to use them in real-world applications correctly. From ancient examples of secret messages and the spies that cracked them to modern cryptographic applications, you will have the opportunity to explore the foundations of data security.
LAB 01
Hashing and Encoding
LAB 02
Cryptography Methods
LAB 03
Key-Based Encryptions
LAB 04
Decrypting Techniques
Scenario: CR001
Attackers use a technique that could allow them to access the entire content of a password-protected or encrypted PDF file. Small press companies suffered data exposure; the local security department was able to retrieve some of the data, but the rest of the files were encrypted.
Scenario: CR002
Cybersecurity researchers released an updated version of a ransomware decryption tool that could allow millions of users to unlock their encrypted files. A problem appeared when some of the files couldn’t be decrypted and needed some special knowledge in algorithms. The researchers want your help to understand some of the encryptions their tool couldn’t decrypt.