Applied Cryptography Workshop

Guy Barnhart-Magen

November 4, 2019

Course Objectives

At the end of the course, participants will:

Course Overview

The growth and central role that the Internet of Things play in the technology world is a proven fact. IoT is bringing the network to the physical aspects of our lives; our cars, utilities, homes, cities, industries and more. With such influence, IoT security is the main concern for the whole industry of IoT stakeholders, from developers to service providers, customers, and end-users. This course outlines the state-of-the-art prevailing practices for IoT security and how this topic is evolving. It is intended for IoT developers and managers to make a strategic decision for their IoT products both as a vendor and as a customer.

The use of cryptography permeates our daily digital lives, from securing the internet to banking transactions - we usually never hear of cryptography, until it fails. The failure of cryptographic building blocks is rare - and often the case is either wrongly implemented cryptographic software or bad design decisions of such products. The goal of this course is to supply the participants with tools and knowledge of how to better analyze such systems, pitfalls to watch for and focus areas to strengthen their approach.

The course does not assume a background in mathematics

Course Duration

2-day instructor-led training

Course Outlines