Intermediate Cryptography

This intensive 3-day course provides cybersecurity professionals with the theoretical depth and applied techniques required to master cryptography beyond the basics. Through guided labs, protocol analysis, and practical exercises, participants will explore the design, weaknesses, and exploitation of modern cryptographic systems—while preparing for the challenges posed by quantum computing.

In the final modules, the course introduces quantum cryptography concepts—including quantum key distribution (QKD), post-quantum algorithms, and how quantum computing threatens current encryption standards such as RSA and ECC. 

This course is designed for red teamers, cryptanalysts, security engineers, and advanced defenders looking to expand their cryptographic skill set and prepare for future cryptographic threats. Bridging theory with real-world application, this training is essential for those working in high-security environments where cryptographic trust is critical.

Course curriculum

    1. Introduction to Intermediate Cryptography

    2. Quantum Mechanics Introduction

    3. Quantum Computers Introduction Part I

    4. Quantum Computers Introduction Part II

    5. Quantum Resistant Cryptography

    6. Introduction to Intermediate Concepts

    7. Foundations & Mathematical Background

    8. Number Theory Basics

    9. Block Ciphers

    10. Case Study WEP

    11. Caesar Cipher with Python Part I

    12. Caesar Cipher with Python Part II

    13. Single XOR Cipher with Python

    14. Attacks on Symmetric Cryptography

    15. Message Authentication & Integrity

    16. Case Study SHA-1

    17. Public-Key Cryptography

    18. Public-Key Encryption Systems

    19. RSA Implementation

    20. Digital Signatures

    21. Public Key Infrastructure

    22. Secure Key Exchange Protocols

    23. Post Quantum Cryptography

    24. Homomorphic Encryption

    25. Case Study Bluetooth KNOB

    26. Collision in MD4 with Python

    27. Attacks and Defenses

About this course

  • $299.00

Requirements

While not mandatory, it is recommended that participants have the following tools installed to fully engage with the hands-on exercises:

  • Kali Linux

These tools will enhance your ability to work effectively with the course materials and practical exercises.