Back to all courses

Authentication, passwords and applied cryptography

Individual course

This course will teach the participants technologies and techniques how authentication and crypto is being broken/hacked in practice, and what are practical defence-in-depth approaches. Breaking authentication, passwords and crypto in many cybersecurity situations have far-reaching implications up to complete compromise of any system. Therefore, it is crucial that the participants who set on the professional cybersecurity career path master the background knowledge, techniques and tools that are indispensable for breaking and defending authentication, password and crypto security.

Course contents

  • Definitions
  • Passwords 1
  • Passwords 2
  • Passwords 3
  • Hashes 1
  • RSA and DSA 1

Learning outcomes

After successfully completing this course, the student

  • understands what applied crypto is and where it is used.
  • understands how to investigate applied crypto from practical perspective.
  • understands how to attack applied crypto in real-world.
  • has practiced individual small tasks simulating real-world applied crypto situations.

Course material

SSH terminal program(s) and compatible browser(s).

Completion methods

Exercise assignments and a final report.

More information in the University of Jyväskylä study guide.

You can get a digital badge after completing this course.

tietoturva, salasanat, kryptografia, krypto, hajautusalgoritmi

Responsible teacher

University of Jyväskylä
Andrei Costin

Further information about the course and studying

University of Jyväskylä
Annemari Auvinen
University of Jyväskylä
Timo Hämäläinen

Contact person for applications

FITech Network University
Fanny Qvickström, Student services specialist
Start here
Start here
Category:
ICT Studies,
Technical studies
Topics:
5G technology,
Computer engineering,
Information security,
Internet technology
Course code:
KYBS2004
Study credits:
5 ECTS
Price:
0 €
Course level:
Teaching period:
20.3.–26.5.2023
Application start date:
07.11.2022
Application deadline:
12.3.2023
Host university:
University of Jyväskylä
Who can apply:
Adult learner,
Degree student
Teaching method:
Online
Teaching language:
English
General prerequisites:
Basic IT knowledge, basic programming skills, basic OS/VM skills, networking skills, basic cloud computing or database skills. Must have knowledge about computer science, information technology, basic and main security concepts. Nice-to-have knowledge: Linux, command-line, SSH, VMs, docker, Kali, OWASP Top10, Hashing, digital signatures, encryption/decryption, public/private key crypto, shared key crypto, PKI, JohnTheRipper, Hashcat, ITKST56
Interested in this course? Subscribe and get updates about the course directly to your email. You can cancel subscription any time you want.