(eCornell) Authenticating Machines
Training Provider: GENASHTIM
Course Reference: TGS-2023038332
S$1,000
About This Course
Protocols for authenticating machines play an important role in systems security, and this course will focus on various aspects of this challenge. Using case studies of protocols that work and that have failed will help you to acquire the skill � and the skepticism � necessary to analyze and deploy authentication protocols successfully. In this course, you will investigate shared key and public key cryptography along with the trade-offs associated with these different types of keys. You will also examine some of the standard cryptographic building blocks and their use. The course is provided by eCornell in partnership with Genashtim
What You'll Learn
Define the Dolev-Yao threat model and identify three primary classes of attacks
Recognize when a protocol may be vulnerable to these types of attacks
Develop a tool kit of existing valid protocols for authentication and key distribution
Recognize the challenges of adapting a protocol into a real-world system
Evaluate the trade-offs between symmetric key cryptography and public key cryptography
Analyze different approaches to distributing and revoking keys
Recognize when a protocol may be vulnerable to these types of attacks
Develop a tool kit of existing valid protocols for authentication and key distribution
Recognize the challenges of adapting a protocol into a real-world system
Evaluate the trade-offs between symmetric key cryptography and public key cryptography
Analyze different approaches to distributing and revoking keys
Course Details
Back to All Courses
Note: To apply for this course, visit the SkillsFuture website or contact the training provider directly.
More Courses from GENASHTIM
The framework used in this course for solving fluid dynamics problems can be applied to a wide array...
While 2D simulations are a good place to begin, many of the real-world applications of simulation re...
In this course, you will analyze the processes and theories you must consider as you begin to explor...