(eCornell) Authenticating Machines

Training Provider: GENASHTIM
Course Reference: TGS-2023038332
S$1,000

About This Course

Protocols for authenticating machines play an important role in systems security, and this course will focus on various aspects of this challenge. Using case studies of protocols that work and that have failed will help you to acquire the skill � and the skepticism � necessary to analyze and deploy authentication protocols successfully. In this course, you will investigate shared key and public key cryptography along with the trade-offs associated with these different types of keys. You will also examine some of the standard cryptographic building blocks and their use. The course is provided by eCornell in partnership with Genashtim

What You'll Learn

Define the Dolev-Yao threat model and identify three primary classes of attacks
Recognize when a protocol may be vulnerable to these types of attacks
Develop a tool kit of existing valid protocols for authentication and key distribution
Recognize the challenges of adapting a protocol into a real-world system
Evaluate the trade-offs between symmetric key cryptography and public key cryptography
Analyze different approaches to distributing and revoking keys

Course Details

Duration 15 hours
Language English
Training Commitment Part Time
Total Enrolled New course
Back to All Courses
Note: To apply for this course, visit the SkillsFuture website or contact the training provider directly.

More Courses from GENASHTIM

The framework used in this course for solving fluid dynamics problems can be applied to a wide array...
Duration 12 hours
Fee After Subsidy S$700
While 2D simulations are a good place to begin, many of the real-world applications of simulation re...
Duration 12 hours
Fee After Subsidy S$700
In this course, you will analyze the processes and theories you must consider as you begin to explor...
Duration 12 hours
Fee After Subsidy S$700