From the course: Introduction to Applied Cryptography and Cryptanalysis by Infosec
Introduction to the course
From the course: Introduction to Applied Cryptography and Cryptanalysis by Infosec
Introduction to the course
- [Instructor] Hello, and welcome to this introduction to applied cryptography and cryptanalysis learning path. This is called an applied cryptography and cryptanalysis path because the focus of the path and what we'll be talking about here is not on the theoretical aspects of cryptography. So, we're going to skip over a large amount of detail in ciphers, a lot of different cryptanalytic attacks against ciphers, and focus on the tools and skillsets around cryptography that could be useful for a cybersecurity professional. And so, this course is broken up into three main phases. In the first phase, we're going to have a discussion of cryptography, so the study of codes. We're going to start out with introduction, laying the groundwork, important terms, et cetera, then move into describing different types of ciphers, what they are, how they work, what they're good for, et cetera. After that first phase, we're going to move into an applied cryptography section where we'll have several courses that describe some of the common applications of cryptography in modern networking, and, when applicable, some of the security considerations around them. And then, finally, in the third phase of this course, we're going to be talking about cryptanalysis, or breaking cryptography. We'll start out with a course describing the fundamentals of cryptanalysis, some of the most common breakable encryption algorithms and encoding algorithms that are used in malware command and control and similar contexts, how to break those algorithms. And then, in the final video of this learning path, we'll have demonstrations of some applications of applied cryptanalysis, like decryption of TLS in Wireshark, decrypting a malware sample's command and control protocol, and removing the obfuscation on a file that's being downloaded as a multi-stage malware infection. And so, the goal of this learning path is really to provide a little bit of knowledge and hands-on experience around using cryptography and understanding it at a useful level for cybersecurity. Thank you.