ECES-Banner03

About this course

If you think that there is only one type of encryption – think again!

Secure organizations employ multiple levels of encryption – database encryption, VoIP encryption, portable storage encryption, mobile devices encryption, Wi-Fi encryption, e-mail encryption, file encryption – server/desktop, network link encryption, web server encryption, tape backup encryption and many more.

Some of the most recent attacks that have had serious consequences share one thing in common – they all had either none or little effective encryption. This resulted in thousands of users being affected and hundreds of millions in losses. It resulted in serious decline of brand value and public embarrassment.

Prerequisite

No prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required.

Who should attend?

Penetration Testers, Computer Forensics Specialists, Anyone involved in selecting, implementing VPN’s or digital certificates, Anyone involved in information security operation

Course Contents

Module 01: Introduction and History of Cryptography
Module 02: Symmetric Cryptography & Hashes
Module 03: Number Theory and Asymmetric Cryptography
Module 04: Applications of Cryptography
Module 05: Applications of Cryptography

Training Info

Language: Conducted in Thai Language
Duration: 3 Days
Venue: ACinfotec Training Center
16th Fl., Asia Centre Bldg., South Sathorn Rd.
Training Fees: 39,000 BAHT (Ex.Vat 7%)
Tel : 02 670 8980-3 ext. 304, 305
E-mail: [email protected]