TWO   |   FOUR   |   75%   |   16

            SCENARIOS                    LABS                     HANDS-ON           DURATION

Cryptography is an indispensable tool for protecting information in computer systems. In this course, you will learn the inner workings of cryptographic systems and how to use them in real-world applications correctly. From ancient examples of secret messages and the spies that cracked them to modern cryptographic applications, you will have the opportunity to explore the foundations of data security.

LAB 01

Hashing and Encoding

LAB 02

Cryptography Methods 

LAB 03

Key-Based Encryptions

LAB 04

Decrypting Techniques

Scenario: CR001

Attackers use a technique that could allow them to access the entire content of a password-protected or encrypted PDF file. Small press companies suffered data exposure; the local security department was able to retrieve some of the data, but the rest of the files were encrypted.


Scenario: CR002

Cybersecurity researchers released an updated version of a ransomware decryption tool that could allow millions of users to unlock their encrypted files. A problem appeared when some of the files couldn’t be decrypted and needed some special knowledge in algorithms. The researchers want your help to understand some of the encryptions their tool couldn’t decrypt.

  • White LinkedIn Icon
  • White Facebook Icon

Ze'ev Jabotinsky St 7,
Ramat Gan, IL.

© 2020 by ThinkCyber