Cryptography Weaknesses Course

In this course, you'll explore the importance of using the best tools for the job.

1 hour, 24 minutes

Course description

This course provides a look at weaknesses in common cryptographic logic, including the better options that we have available to us. Also includes an overview of correctly handling our secret information.

Syllabus

Handling Secrets

Video - 00:21:00

Explore the secure handling of passwords and other secrets.
Side-channel Information Leaks

Video - 00:24:00

A look at advanced timing-based attacks.
Encryption and Authentication

Video - 00:19:00

Explore the importance of securing and verifying data.
Weak Random Numbers

Video - 00:20:00

An overview of random and pseudo-random numbers.

Meet the author

David Myers

David Myers is a senior full-stack software engineer specializing in the development of complex web applications, with over 18 years of experience developing for the web. He primarily works within the LAMP stack of technologies but often utilizes whatever technology is needed. This includes Nginx, Python and Redis when discussing back-end technologies and ES6, Typescript, jQuery and Angular for front-end technologies. He has a broad range of experience working with clients and companies across many different industries.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Target Network Analyst
  • Cyber Intel Planner
  • Cyber Ops Planner

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust