Cryptography is an indispensable tool for protecting information in computer systems. In this course, you will learn the inner workings of cryptographic systems and how to use them in real-world applications correctly. From ancient examples of secret messages and the spies that cracked them to modern cryptographic applications, you will have the opportunity to explore the foundations of data security.

Duration: 16 Hours

Target Audience

  • Security Analysts
  • IT Personal
  • Law Enforcement


  • Basic Understanding of Math and Computers


  • Understand the basics of Cryptography
  • Being able to identify different kinds of Cryptography
  • Creating tools to crack different Cryptography


Module 1: Cryptography in Theory

In this module, we will discuss Cryptography in theory, understand different types of algorithms, and also get an opportunity to try encrypting data by completing cryptography challenges. At the end of the module, you will understand the difference between hashes and ciphers and create your own.

  • Introduction to Cryptography
    o Ciphertext and Plaintext
    o Ciphers in General
    o Understanding Hashes and Their Usage
  • Generating Hash Using Powershell and CMD
  • Comparing File Content using Hashing
  • Hashes as Digital Signatures
    o Encodings
  • Hashes vs. Encodings
  • Understanding Base’s
  • Manually Generating Base32 Encodings
  • Usage of Cryptography in the Cyber World
    o The Theory of Cryptography in Cyber-Security
  • Hash-Based Password Verification
  • VPNs and SSL Based VPNs
  • IPsec and Tunnelling
    o Poor Cryptography Threats
  • ECB Mode
  • Algorithm Problems
  • Collision Attacks
  • Random Number Generation
  • Key Management Problems

Module 2: Advanced Cryptography

In this module, we are going to do a lot of Hands-On to learn how to implement all the famous Techniques and Methodologies of Cryptography practically. We will cover most of the private key cryptosystems such as Caesar cipher, Vigenère cipher, Data Encryption Standard (DES) and Advanced Encryption Standard (AES). At the end of the module, the student will be able to understand cryptography more widely.

  • Key Based Encryptions
    o Ciphers in General
    o Symmetric-Key
  • Defining Secure Encryption
  • CBC vs. CTR
  • Understanding CPA-Secure Encryption
  • CCA Attacks
    o Asymmetric-Key
  • Public-Key and Private-Key Concepts
  • Diffie-Hellman Key-Exchange
  • El-Gamal
  • Hybrid Encryption in General
  • RSA and RSA-KEM
    o Block Ciphers
    o Attacks on Block Ciphers
  • Practical Ciphering
    o Classical Encryption Types
  • AES – Advanced Encryption Standard
  • Blowfish
  • DES
  • RC2 and RC4
  • ROT13 and ROT47 – Ceaser Ciphers
  • XOR
  • The Vigenère Cipher
    o Mechanical – Enigma and Lorenz
    o Encryption in Application
  • Concept of Encryption in Whatsapp
  • SSH – Symmetric Encryption
  • Diving into SSL\TLS Structure