Skip to main content

CYBR 432 Cryptography for Cybersecurity Practitioners

This course provides students with a thorough foundation of applied cryptography for cybersecurity practitioners. As encryption technologies continue to integrate into everyday culture, the importance of cryptography and encryption knowledge of cybersecurity practitioners continues to increase. Students will learn and be able to apply and analyze: the history of cryptography from the earliest ciphers to current encryption methodology, mathematical foundations for cryptography, symmetric and asymmetric algorithms, and applied cryptography pertaining to Virtual Private Networks (VPNs), SSL/TLS, strategies for defense utilizing encryption and cryptography, military applications, steganography, cryptanalysis, and more. Additionally, students will look to the future of cryptography and encryption including a look into quantum cryptography and encryption in cloud environments. Overlap: ICS 483.

Prerequisites

Special information

First day attendance is mandatory.
Formerly: ICS 483. Note: Students are responsible to both be aware of and abide by prerequisites for CFS/CYBR/ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Undergraduate credits

Effective May 6, 2020 to present

Learning outcomes

General

  • Analyze the evolution of cryptography from the earliest known ciphers to present day encryption techniques
  • Apply mathematical foundations of cryptography
  • Interpret and use symmetric cryptography principles and encryption techniques such as Feistel networks, Substitution-Permutation Networks, S-Box design, and Cryptographic Hashes
  • Interpret and use asymmetric cryptography principles and encryption techniques such as Elliptic Curve Cryptography and common Asymmetric algorithms such as RSA, Diffie-Hellman, and Digital Certificates
  • Dissect applied cryptography in military applications, SSL/TLS, Virtual Private Networks (VPNs), Steganography, Cryptanalysis, Cryptographic backdoors
  • Examine, compare, and architect defense strategies using encryption and cryptography principles
  • Identify and make sense of attacks on encryption and how they impact the principles of Confidentiality, Integrity, and Availability
  • Model how malicious threat actors use encryption to bypass common defense techniques
  • Illustrate the most likely future of cryptography including quantum cryptography and cryptography in cloud environments

Spring 2024

Section Title Instructor books eservices
50 Cryptography for Cybersecurity Practitioners Munmun, Mousumi Books for CYBR-432-50 Spring 2024 Course details for CYBR-432-50 Spring 2024

Summer 2024

Section Title Instructor books eservices
50 Cryptography for Cybersecurity Practitioners Rabieh, Khaled Books for CYBR-432-50 Summer 2024 Course details for CYBR-432-50 Summer 2024

Fall 2024

Section Title Instructor books eservices
50 Cryptography for Cybersecurity Practitioners Munmun, Mousumi Books for CYBR-432-50 Fall 2024 Course details for CYBR-432-50 Fall 2024