- 1Who are the targets? Why?
- Cryptanalysts and those who employ Cryptography in their daily tasks
- Technical security persons who are deeply fascinated with the study of Ciphers or Ciphertext
- Those with an interest of either finding weaknesses in Ciphers or Ciphertext
- Those with a responsibility of securing information or breaking cryptosystems
- Analyst working for a broad range of organizations for unique reasons such as financial institutions Key global players looking to protect crucial information from competitors to maintain a competitive position
- Governments trying to secure their diplomatic and military transmissions
Where would a Cryptanalysts be required?
All levels of government such as:
- Special services
- Intelligence agencies
- Central Banks
Organizations such as:
- Bank and trust companies
- Brokerage and Trading firms
- Financial institutions
- Insurance companies
- Scientific institutions
- Research agencies
- Telecommunication companies
- Computer design firms
- Consulting firms
- Science and Engineering firms
- Involved with online related businesses
- Card related businesses
- 2What sets this training apart from the others?
This course takes students deep into the world of Cryptography laying out the platform which is fundamental to securing in-depth cryptography skills covering:
- Number Theory and Discrete Mathematics
- Symmetric Algorithms
- Asymmetric Algorithms
- 3How is this course different from other ‘’advanced courses’’?
Comparatively this module explores, in-depth, the science of cryptography including:
- The history of cryptography
- Latest and key cryptographic methods
- Popular techniques like cryptanalysis to break cryptography
- Hashing and digital certificates
Therefore making this course highly appropriate for security professionals interested in understanding encryption on a deeper level and for those needing to learn techniques that are crucial to encryption and its deciphering
- 4What makes you an expert?
The facilitator brings with him:
Chuck Easttom is the author of 13 computer science books including 2 computer security textbooks used at universities around the globe and translated into several languages. He also holds a host of IT certifications including MCP, MCSA, MCSE, MCAD, MCTS (Windows 7, Windows Server 2008, SQL Server 2008, and Visual Studio 2010), MCITP (Windows 7 and SQL Server 2008), MCDBA, MCT, A+, Network+, Linux+,iNet+, Server+, CEH, CHFI, ECSA, and CISSP. He currently has 7 provisional patents, all related to computer science and 4 related to computer security. One of those patents regards a new method of steganography, another regards a new approach to detecting spyware, and yet another involves the invention of a new, more stable file system.
Mr. Easttom is also the inventor of a method for quantifying network security that is being taught at several universities, and most recently has developed a new approach to creating ghost drives. He has taught various security related courses for several years and has over 10 years of teaching experience. He is also a frequent consultant on various computer related court cases including both criminal and patent cases. While Mr. Easttom has a broad range of security expertise, his passion has always been cryptography.
- 5What’s the benefit & why should I take a CAST Cryptography course?
At the end of this 3 day course, you would have a clear understanding on:
- Incorporating the latest in Cryptography methods and techniques for better encryption and decryption
- Reviewing the challenges involved in applying Symmetric Cryptography Algorithms to process large streams of data at high speeds
- Appreciating the benefits of incorporating Asymmetric Algorithms with Symmetric Algorithms to enhance in-house security systems
- Grasping the fundamental aspects behind L0phtCrack and Brute-force as powerful tools used in Cryptanalysis
- Harnessing the use of powerful number theory in the application of Cryptography
- 6How is this hands-on?
Students will actually be able to see the math of various algorithms and learn the algorithm to the point of being able to implement it themselves, and not just rely on a computer/software to accomplish their intended task.
Our course will allow:
- Students to use several steganography tools
- Students to use several cryptanalysis tools
- Students to use both manual and computerized cryptanalysis tools
- 7Competition comparison
Most security professionals’ knowledge of cryptography ends with the cryptographic material on exams like the CISSP. Such exams only scratch the surface of what cryptography is, with no depth on any details about cryptography theory or practical implementation.