Learn Applied Cryptography and Cryptanalysis

This learning path introduces cryptography, its applications, and methods for decrypting and deobfuscating data.

13 courses  //   55 videos  //   6 hours of training

Free training week — 700+ on-demand courses and hands-on labs

Applied Cryptography and Cryptanalysis training

This learning path discusses applied cryptography and cryptanalysis. The fundamentals of cryptography are introduced as well as common applications of cryptography. The path also introduces weak algorithms used by malware, how to identify them and methods for deobfuscating the data.

Learning path components

Cryptography and Cryptanalysis Project
Practice Exam
Cryptography and Cryptanalysis Project

Cryptography and Cryptanalysis Project

Six challenges will test your applied cryptography skills. In this project, you’ll need to find information in encrypted network traffic, circumvent obfuscation to examine malware network communications and configuration samples, break down a hash function operation to find a specific input value and find the values of obfuscated passwords and cookies.

Number of questions: 6

Cryptography and Cryptanalysis Skill Assessment
Assessment
Cryptography and Cryptanalysis Skill Assessment

Cryptography and Cryptanalysis Skill Assessment

See how your Applied Cryptography and Cryptanalysis skills stack up against other professionals in your field.

Number of questions: 20

Introduction to Cryptography
Course
Introduction to Cryptography

Introduction to Cryptography

This course defines the basic vocabulary and concepts of cryptography.

4 videos
26 minutes of training

Fundamentals of Cryptography
Course
Fundamentals of Cryptography

Fundamentals of Cryptography

This course describes mathematics and structures commonly used in cryptography.

3 videos
21 minutes of training

Symmetric Cryptography
Course
Symmetric Cryptography

Symmetric Cryptography

This course provides an introduction to symmetric encryption algorithms.

6 videos
45 minutes of training

Asymmetric Cryptography
Course
Asymmetric Cryptography

Asymmetric Cryptography

This course provides an introduction to asymmetric encryption algorithms.

6 videos
37 minutes of training

Hash Functions
Course
Hash Functions

Hash Functions

This course provides an introduction to hash functions.

4 videos
16 minutes of training

Public Key Infrastructure (PKI)
Course
Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI)

This course describes the use of cryptography in the PKI infrastructure.

3 videos
19 minutes of training

SSL and TLS
Course
SSL and TLS

SSL and TLS

This course describes the use of cryptography in SSL and TLS.

3 videos
27 minutes of training

Virtual Private Networks (VPNs)
Course
Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs)

This course describes the use of cryptography in Virtual Private Networks (VPNs).

3 videos
19 minutes of training

Secure Credential Management
Course
Secure Credential Management

Secure Credential Management

This course describes the use of cryptography in securely managing user credentials.

4 videos
27 minutes of training

Full Disk Encryption
Course
Full Disk Encryption

Full Disk Encryption

This course describes the use of cryptography in full disk encryption.

3 videos
10 minutes of training

Blockchain Technology
Course
Blockchain Technology

Blockchain Technology

This course describes the use of cryptography in blockchain technology.

4 videos
25 minutes of training

Introduction to Cryptanalysis
Course
Introduction to Cryptanalysis

Introduction to Cryptanalysis

This course introduces you to the field of cryptanalysis.

8 videos
37 minutes of training

Applied Cryptanalysis
Course
Applied Cryptanalysis

Applied Cryptanalysis

This course provides demonstrations of using cryptanalysis for incident response.

4 videos
26 minutes of training

 

What you’ll learn.

  • What ciphers are and how they work
  • Applying cryptography in modern networking
  • Cryptanalysis and the breaking of cryptography

Who is this for?

This skill path is designed for:

  • Cybersecurity engineers
  • Malware analysts
  • IT and security practitioners
  • Anyone interested in learning about the practical application of cryptography

Train on your schedule

Personal
Teams

Infosec Skills subscription

Monthly
Annually
  • 80+ role-based learning paths (Ethical Hacking, Threat Hunting, etc.)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (CISSP, Security+, etc.)
  • Skill assessments
  • Infosec peer community support
  • Create custom learning paths from 100s of courses

Infosec Skills boot camp

Request a quote for pricing

 

Request Quote Browse Boot Camps
  • Exam Pass Guarantee
    If you don’t pass your exam on the first attempt, you'll get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
  • 100% Satisfaction Guarantee
    If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
  • Live, instructor-led training (available in-person or online)
  • 90 day extended access to recordings of daily lessons
  • Certification exam voucher
  • Learn by doing with hundreds of additional hands-on courses and labs Infosec Skills Annual

Infosec Skills subscription

Annual

$599 per learner / year

Request Quote Free Team Trial
  • Team administration and reporting
  • Transferable licenses
  • 80+ role-based learning paths (Ethical Hacking, Threat Hunting, etc.)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (CISSP, Security+, etc.)
  • Skill assessments
  • Create and assign custom learning paths
  • Dedicated client success manager

Infosec Skills boot camp

Request a quote for pricing

 

Request Quote Browse Boot Camps
  • Team boot camp administration and reporting
  • Exam Pass Guarantee
    If you don’t pass your exam on the first attempt, you'll get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
  • 100% Satisfaction Guarantee
    If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
  • Knowledge Transfer Guarantee
    If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
  • Certification exam vouchers
  • Live, instructor-led training (available onsite, in-person or online)
  • 90 days extended access to recordings of daily lessons
  • Build your team's skills with hundreds of additional hands-on courses and labs

Award-winning training that you can trust

Best Software - Highest Satisfaction

Best Software - Highest Satisfaction

Infosec Skills

Best IT Security-related Training Program

Best IT Security-related Training Program

Infosec Skills

Best Cybersecurity Education Provider & Best Security Education Platform

Best Cybersecurity Education Provider & Best Security Education Platform

Infosec Skills

Most Innovative Product - Cybersecurity Training for Infosec Professionals

Most Innovative Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Global Excellence - Cyber Security Education & Training

Global Excellence - Cyber Security Education & Training

Infosec Skills

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.

LX Labs

SC Media names Infosec Skills Best IT Security Training

See for yourself why Infosec Skills leads the cybersecurity training industry.