Back to all courses

Authentication, passwords and applied cryptography

Individual course

Max amount of FITech students: 30

Persons without a valid study right to a Finnish university have preference to this course.

This course will teach the participants technologies and techniques how authentication and crypto is being broken/hacked in practice, and what are practical defence-in-depth approaches. Breaking authentication, passwords and crypto in many cybersecurity situations have far-reaching implications up to complete compromise of any system. Therefore, it is crucial that the participants who set on the professional cybersecurity career path master the background knowledge, techniques and tools that are indispensable for breaking and defending authentication, password and crypto security.

Course contents

  • Definitions
  • Passwords 1
  • Passwords 2
  • Passwords 3
  • Hashes 1
  • RSA and DSA 1

Learning outcomes

After successfully completing this course, the student

  • understands what applied crypto is and where it is used.
  • understands how to investigate applied crypto from practical perspective.
  • understands how to attack applied crypto in real-world.
  • has practiced individual small tasks simulating real-world applied crypto situations.

Course material

  • SSH terminal program(s) and compatible browser(s)
  • Course materials/slides (PDFs) on the course platform

Teaching schedule

  • Lectures are fully pre-recorded
  • Periodic online Q&A sessions (to be defined)

Completion methods

This course is organised as self-study. Mandatory tasks are exercise assignments and a final report.

More information in the University of Jyväskylä study guide.

You can get a digital badge after completing this course.

tietoturva, salasanat, kryptografia, krypto, hajautusalgoritmi

Responsible teacher

University of Jyväskylä
Andrei Costin

Further information about the course and studying

University of Jyväskylä
Annemari Auvinen
University of Jyväskylä
Timo Hämäläinen

Contact person for applications

FITech Network University
Fanny Qvickström, Student services specialist
Start here
Start here
5G technology,
Computer engineering,
Information security,
Internet technology
Course code:
Study credits:
0 €
Course level:
Teaching period:
Application start date:
Application deadline:
Host university:
University of Jyväskylä
Who can apply:
Adult learner,
Degree student
Teaching method:
Teaching language:
General prerequisites:
Basic IT knowledge, basic programming skills, basic OS/VM skills, networking skills, basic cloud computing or database skills. Must have knowledge about computer science, information technology, basic and main security concepts. Nice-to-have knowledge: Linux, command-line, SSH, VMs, docker, Kali, OWASP Top10, Hashing, digital signatures, encryption/decryption, public/private key crypto, shared key crypto, PKI, JohnTheRipper, Hashcat, ITKST56
Interested in this course? Subscribe and get updates about the course directly to your email. You can cancel subscription any time you want.