Next scheduled date:November 20th, 2025 @ 11:30 AM EST
Description
This four-hour, hands-on course provides IT and security teams with a practical introduction to cryptography. Participants will gain working knowledge of core concepts—symmetric and asymmetric encryption, hashing, digital certificates, and key management—while reinforcing skills through guided labs. The program is designed to quickly build confidence in using cryptography to protect data at rest, secure data in transit, and support authentication and trust in digital environments.
System Requirements
Software/Hardware Requirements
None. The labs will be cloud based.
Syllabus
Course Overview
This course introduces the fundamental concepts of cryptography and its role in protecting information in the digital world. Students will learn how cryptography secures communication, ensures data integrity, verifies identities, and enables trust across insecure networks. The course blends history, core principles, modern techniques, and hands-on labs to provide both conceptual knowledge and practical skills.
Topics Covered
Foundations of Cryptography: What cryptography is, key terms, and historical background.
Core Concepts: Plaintext vs. ciphertext, algorithms, encryption keys, and brute force attacks.
Cryptographic Services: Confidentiality, integrity, authentication, and digital signatures.
Symmetric & Asymmetric Encryption: DES, AES, RSA, ECC, and the Diffie-Hellman key exchange.
Hashing & Integrity: MD5, SHA families, and digital signatures.
Protecting Data: Data in transit (SSL/TLS, IPSec, VPNs, Wi-Fi) and data at rest (BitLocker, FileVault, VeraCrypt, PGP/GPG).
Key Management: Key length, key vaults, key derivation functions, and best practices.
Public Key Infrastructure (PKI): Digital certificates, certificate authorities, OCSP, and HTTPS.
Emerging Topics: Quantum-resistant cryptography, cryptocurrency basics, and blockchain.
Multi-Factor Authentication: Tokens, authenticator apps, and FIDO devices.
Labs & Hands-On Exercises
Hashing with WinMD5 and Linux tools
Encrypting with AES in Windows and Linux
Using VeraCrypt for disk encryption
Practicing PBKDF2 for key derivation
Analyzing digital certificates
Learning Outcomes
By the end of this course, students will:
Understand the purpose and principles of cryptography.
Identify and explain the major types of cryptographic algorithms.
Apply hashing and encryption to secure data in labs.
Explain how PKI builds trust and how certificates validate identity.
Recognize the challenges of key management and emerging threats like quantum computing.
Gain practical skills in using cryptographic tools to protect information.
• IT and security staff who need a solid foundation in encryption.
• New or junior cybersecurity professionals looking to strengthen their technical knowledge.
• Organizations seeking to upskill employees on practical cryptography concepts without heavy theory or math.
Doc Blackburn is a seasoned (old) cybersecurity instructor with decades of experience in IT, security, and compliance. Over his career, he has worked in many areas of IT, including systems administration, programming, network design, cloud services, web development, and risk management, bringing a broad technical foundation to his teaching. For more than 13 years, Doc has trained students and professionals to understand, implement, and maintain effective security practices, drawing on real-world consulting experience in compliance frameworks such as NIST SP 800-171, CIS Critical Controls, and MITRE ATT&CK. Known for making complex concepts accessible to all audiences, he blends technical depth with practical insights, preparing learners to address today’s evolving cyber threats.
Register for Upcoming
Filter by Product Date
Filter by Product Instructor
Filter by Product Type
Workshop: An Introduction to Cryptography with Doc Blackburn