Information and features
Published
(Updated )
University of Jyväskylä – FITech
Authentication, passwords and applied cryptography
Data encryption is part of cyber security. Learn the basics of authentication and cryptography.
5 cr
Summary
This course will teach the participants technologies and techniques how authentication and crypto is being broken/hacked in practice, and what are practical defence-in-depth approaches.
Breaking authentication, passwords and crypto in many cybersecurity situations have far-reaching implications up to complete compromise of any system.
Completion methods and Course workload:
On-line course.
Exercise Assignment tasks: 5 * 3h = 15h
Final Report task: 10h
Online Assistance (Q&A): 5 * 2h = 10h
Self-study (includes going over materials of 10 lectures at own pace): 90h + 10 * 1h = 100 h
Contains
Check the institution’s website for the required studies.
No active implementations at present.
Additional information and registration
- Price and registration period
Check on the university's website
Additional information:
Fields
Information and communication technologies
Scope
5 cr
Code
KYBS2004