The HSM and Cryptography Workshop accelerates your understanding of cryptography and its functions through the use of the provided software HSM. It will provide critical insights and information for all the cryptographic functions like Symmetric key functionality, Asymmetric key functionality, hashing functionality, and message authentication command (MAC) functionality.
This workshop, unique in the industry, is perfect for a time when travel and gatherings are restricted, but you still want to increase your knowledge of the cryptography functions.
By the end of this workshop, you will feel confident in your understanding of the overall cryptography functions. You will gain a thorough understanding of how cryptography works.
Available 24/7 online on your phone, tablet, laptop, or desktop.
Work at your own pace – review modules as many times as you need to.
No travel is needed to attend classes. The travel costs you avoid could pay for the course.
Easily digestible modular lessons with an average of 26 slides per module.
Proprietary confidence-building hands-on labs and lab tools.
Lab tool you can use on the job.
Become conversant with the industry lingo.
Accelerate your career by applying insights based on your knowledge.
Who should take this course?
This course will be of benefit to anyone interested in understanding cryptography:
Software developers
Product managers
Security managers
Operations Manager
Project managers
The Typhon cryptography workshop consists of 13 modules:
M100 - Crypto course overview
M101 - Crypto foundation
M102 - Symmetric key intro
M103 - Symmetric key methods
M104 - Asymmetric keys
M105 - MAC HASH DS
M106 - PKI
M107 - Common criteria
M108 - FIPS
M150 - Lab tool installation
M151 - Lab on symmetric keys
M152 - Lab on asymmetric keys
M153 - Lab on MAC HASH DS
Typhon - the Wiseravens cryptography tool provided for use in the class was named for the father of Cerberus, the three-headed watchdog of Greek mythology, and provides the following functions:
Built-in software HSM to store your keys.
Interfaces with any hardware HSM that supports PKCS#11.
Data can be input in either ASCII or HEX.
Robust logging allows you to save all your work for later review.
Symmetric key functionality:
DES / DES2 / 3DES key generation in ECB or CBC mode.
AES-128 / AES-192 / AES-256 key generation in ECB or CBC mode.
Ability to run in Lab mode or HSM mode.
HSM mode allows the storage of your generated keys in the HSM.
Ability to encrypt and decrypt data to test key functionality.
Asymmetric key functionality:
Ability to create and save 512 / 1024 / 2048 / 4096-bit public/private key pairs.
Encryption functions allow you to encrypt with either the public or private Key.
Decryption functions allow you to decrypt with either the public or private Key.
Signing functions allow you to create digital signatures from ASCII or HEX data using.