About the training
In this module the student will learn the fundamentals of cryptography and its application in security protocols. These protocols allow systems to achieve information security, privacy, and trust. Students will learn the mathematics and cryptographic tools to analyse and understand the strengths and shortcomings of such security protocols and will develop an understanding of how to improve insecure systems.
In this module the student will learn the fundamentals of cryptography and its application in security protocols. These protocols allow systems to achieve information security, privacy, and trust. Students will learn the mathematics and cryptographic tools to analyse and understand the strengths and shortcomings of such security protocols and will develop an understanding of how to improve insecure systems.
What you will learn
LO1 Apply mathematical concepts (number theory, geometry and group theory) to understand the working and capabilities of symmetric cryptography, public key cryptography, digital signatures and hash functions. LO2 Critically evaluate and enable real-world implementations of symmetric cryptography, public key cryptography, digital signatures and hash functions. LO3 Develop security protocols which leverage cryptographic techniques to achieve confidentiality, authentication and key exchange. LO4 Analyse future cryptographic needs and applications of cryptography to achieve system security. LO5 Evaluate technical and research papers which will aid continuous learning and students' ability to stay up to date with best practice in the field.
LO1 Apply mathematical concepts (number theory, geometry and group theory) to understand the working and capabilities of symmetric cryptography, public key cryptography, digital signatures and hash functions. LO2 Critically evaluate and enable real-world implementations of symmetric cryptography, public key cryptography, digital signatures and hash functions. LO3 Develop security protocols which leverage cryptographic techniques to achieve confidentiality, authentication and key exchange. LO4 Analyse future cryptographic needs and applications of cryptography to achieve system security. LO5 Evaluate technical and research papers which will aid continuous learning and students' ability to stay up to date with best practice in the field.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Hazel Murray: Hazel.murray@mtu.ie
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Hazel Murray: Hazel.murray@mtu.ie