Learn Applied Cryptography and Cryptanalysis

This learning path introduces cryptography, its applications, and methods for decrypting and deobfuscating data.

13 courses  //   55 videos  //   6 hours of training

Free training week — 1,400+ on-demand courses and hands-on labs

Applied Cryptography and Cryptanalysis training

This learning path discusses applied cryptography and cryptanalysis. The fundamentals of cryptography are introduced as well as common applications of cryptography. The path also introduces weak algorithms used by malware, how to identify them and methods for deobfuscating the data.

Learning path components

Cryptography and Cryptanalysis Project
Practice Exam
Cryptography and Cryptanalysis Project

Cryptography and Cryptanalysis Project

Six challenges will test your applied cryptography skills. In this project, you’ll need to find information in encrypted network traffic, circumvent obfuscation to examine malware network communications and configuration samples, break down a hash function operation to find a specific input value and find the values of obfuscated passwords and cookies.

Number of questions: 6

Cryptography and Cryptanalysis Skill Assessment
Assessment
Cryptography and Cryptanalysis Skill Assessment

Cryptography and Cryptanalysis Skill Assessment

See how your Applied Cryptography and Cryptanalysis skills stack up against other professionals in your field.

Number of questions: 20

Introduction to Cryptography
Course
Introduction to Cryptography

Introduction to Cryptography

This course defines the basic vocabulary and concepts of cryptography.

4 videos
26 minutes of training

Fundamentals of Cryptography
Course
Fundamentals of Cryptography

Fundamentals of Cryptography

This course describes mathematics and structures commonly used in cryptography.

3 videos
21 minutes of training

Symmetric Cryptography
Course
Symmetric Cryptography

Symmetric Cryptography

This course provides an introduction to symmetric encryption algorithms.

6 videos
45 minutes of training

Asymmetric Cryptography
Course
Asymmetric Cryptography

Asymmetric Cryptography

This course provides an introduction to asymmetric encryption algorithms.

6 videos
37 minutes of training

Hash Functions
Course
Hash Functions

Hash Functions

This course provides an introduction to hash functions.

4 videos
16 minutes of training

Public Key Infrastructure (PKI)
Course
Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI)

This course describes the use of cryptography in the PKI infrastructure.

3 videos
19 minutes of training

SSL and TLS
Course
SSL and TLS

SSL and TLS

This course describes the use of cryptography in SSL and TLS.

3 videos
27 minutes of training

Virtual Private Networks (VPNs)
Course
Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs)

This course describes the use of cryptography in Virtual Private Networks (VPNs).

3 videos
19 minutes of training

Secure Credential Management
Course
Secure Credential Management

Secure Credential Management

This course describes the use of cryptography in securely managing user credentials.

4 videos
27 minutes of training

Full Disk Encryption
Course
Full Disk Encryption

Full Disk Encryption

This course describes the use of cryptography in full disk encryption.

3 videos
10 minutes of training

Blockchain Technology
Course
Blockchain Technology

Blockchain Technology

This course describes the use of cryptography in blockchain technology.

4 videos
25 minutes of training

Introduction to Cryptanalysis
Course
Introduction to Cryptanalysis

Introduction to Cryptanalysis

This course introduces you to the field of cryptanalysis.

8 videos
37 minutes of training

Applied Cryptanalysis
Course
Applied Cryptanalysis

Applied Cryptanalysis

This course provides demonstrations of using cryptanalysis for incident response.

4 videos
26 minutes of training

 

What you’ll learn.

  • What ciphers are and how they work
  • Applying cryptography in modern networking
  • Cryptanalysis and the breaking of cryptography

Who is this for?

This skill path is designed for:

  • Cybersecurity engineers
  • Malware analysts
  • IT and security practitioners
  • Anyone interested in learning about the practical application of cryptography

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec

SC Media names Infosec Skills Best IT Security Training

See for yourself why Infosec Skills leads the cybersecurity training industry.