Cryptography and Network Security: Techniques and Tools

Defending your network is a serious skill…and this course is your fast pass to getting good. 

(CRYPTO-NS.AW1) / ISBN : 978-1-64459-648-7
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Our Cryptography and Network Security course arms you with the tools to lock down data, outsmart cyber threats, and master the art of secure communication. 

Study encryptions in depth. Crack the logic behind digital signatures. And deploy real-world protocols like Kerberos, TLS, and IPsec. You’ll dissect ciphers, break down AES encryption, and learn how to shield networks from attacks…because in cybersecurity guessing isn’t an option. 

With hands-on exercises covering everything from hash functions to wireless security, it’s your playbook for defending systems. 

Skills You’ll Get

  • Understand core cryptography principles like substitution, transposition, and cipher techniques.
  • Differentiate between symmetric/asymmetric ciphers and block/stream ciphers.
  • Implement AES encryption and analyze its processing stages.
  • Deploy digital signatures and verify message authenticity.
  • Apply secure hash functions (SHA, HMAC) for data integrity.
  • Master public-key algorithms (RSA, Elliptic Curve Cryptography).
  • Manage cryptographic keys and exchanges securely.
  • Authenticating users via Kerberos and PKI (X.509 certificates).
  • Secure emails with PGP and S/MME protocols.
  • Configure TLS/SSL for web transactions.
  • Design IPsec policies for network-layer protection.
  • Harden wireless networks (802.11i, WPA3) against attacks.
  • Analyze real-world protocols (IPsec, TLS, Kerberos) and their vulnerabilities.
  • Solve security challenges using pseudo-random number generation.
  • Evaluate cryptographic attacks and countermeasures.  

1

Preface

2

An Overview of Network and Information Security

  • Introduction
  • Why security is complex
  • Security goals
  • Different views on security
  • Information security
  • The relevance of security measures in the modern era
  • Threats to information
  • The security architecture
  • The network security model
  • Security service requirements
  • Prerequisites to the application of security service
  • Recapitulation
  • Exercises
3

Introduction to Cryptography

  • Introduction
  • Difference between classic and modern ciphers
  • Kerckhoffs’s principle
  • Ingredients to a symmetric cipher
  • Cryptography
  • The Conventional Security Model
  • Substitution and transposition
  • Monoalphabetic substitution cipher
  • Playfair cipher
  • Hill cipher
  • Vigenere cipher
  • Vernam cipher and Onetime pads
  • Transposition cipher
  • Substitution cipher and S-box
  • Transposition cipher and P-box
  • Rotor Machines
  • Recapitulation
  • Exercises
4

Block Ciphers and Attacks

  • Introduction
  • Cryptographic systems
  • Symmetric key algorithms
  • Block ciphers
  • Attacks
  • Points to remember
  • Excercises
5

Number Theory Fundamentals 

  •  Divisibility
  • Prime numbers
  • Greatest common divisor
  • Congruences
  • Fermat’s little theorem and Euler’s theorem
  • Generating large primes: primality tests
  • Modular exponentiation (Exponentiation modular arithmetic)
  • Discrete logarithms
  • Additional reading 
  • Recommended reading/references 
  • Recapitulation 
  • Exercises
6

Algebraic Structures

  • Algebraic structure
  • Groups
  • Algebraic systems with two binary operations
  • Algebraic operations on polynomials
  • Galois Field GF(pn)
  • Recapitulation
  • Exercises
7

Stream Ciphers and Cipher Modes

  • Introduction
  • Cypher feedback mode
  • Output Feedback Mode
  • Counter Mode
  • IEEE XTS-AES mode
  • IEEE XTS encryption process
  • Recapitulation
  • Exercises
8

Secure Hash Functions

  • Introduction
  • A simple hash function
  • Secure hash functions using block ciphers and CBC
  • Why a unique hash value is possible
  • Applying a hash function for authentication
  • Characteristics of the cryptographic hash function
  • Security requirements attacks and countermeasures
  • Folding
  • Why simple folding fails
  • Secure Hash Algorithm (SHA)
  • Processing of each round
  • The round function Rf ()
  • Avalanche effect with SHA-512
  • SHA-3
  • Iteration function Keccak-f
  • Theta Step function
  • Rho step function
  • Pi step function
  • Chi step function
  • Iota step function
  • Applications of Cryptographic Hash Functions
  • Recapitulatin
  • Exercises
9

Message Authentication using MAC

  • Introduction
  • Integrity check
  • Other security needs for a message
  • Meet in the middle attack
  • Factors deciding the security of MAC
  • Order of encryption and authentication
  • HMAC
  • Conventional message digest vs. HMAC
  • Authenticated Encryption with Associated Data (AEAD)
  • Counter with Cipher Block Chaining Message Authentication Code (CCM)
  • GCM-GMAC (Galois Counter Mode-Galois Counter Message Authentication Code)
  • Key wrapping (KW)
  • Recapitulation
  • Exercises
10

Authentication and Message Integrity Using Digital Signatures

  • Introduction
  • What is a digital signature
  • Attacks on DS
  • Why a digital signature
  • Different DS schemes
  • Improving the process of digital signature
  • Recapitulation
  • Exercises
11

Advanced Encryption Standard

  • Introduction
  • AES characteristics
  • Prerequisites to AES
  • AES architecture
  • AES processing
  • Substitute byte matrix generation
  • Key expansion process
  • Inverse operations
  • Implementation and motivation
  • Recapitulation
  • Exercises
12

Pseudo-Random Numbers

  • Introduction
  • PRN, TRN, and PRF
  • PRN for solving security problems
  • Pseudo random number generators (PRNGs)
  • Using a cipher-based PRNG
  • Real-world PRNGs
  • True Random Numbers (TRNs)
  • Other methods
  • Recapitulation
  • Exercises
13

Public Key Algorithms and RSA

  • Introduction
  • The need for public-key systems
  • How it works
  • The prerequisites to understand RSA
  • RSA and processing in RSA
  • Improving efficiency
  • Cryptanalysis and attacks on RSA
  • Countermeasures
  • Difference: symmetric and asymmetric encryption
  • Recapitulation
  • Exercises
14

Other Public Key Algorithms

  • Introduction
  • Introduction to Elliptic Curves
  • Elliptic curve cryptography
  • Recapitulation
  • Exercises
15

Key Management and Exchange

  • Introduction
  • Key management
  • Need for key management
  • Encryption location
  • The public key distribution
  • Randomness and unpredictability of keys
  • Symmetric key exchange for authentication
  • Public key exchange using certificates
  • Recapitulation
  • Exercises
16

User Authentication Using Kerberos

  • Introduction
  • The authentication process in Kerberos
  • Kerberos protocol overview
  • The challenges and solutions in building a protocol
  • Multiple Kerberos realms
  • Kerberos version V protocol
  • Kerberos limitations
  • Recapitulation
  • Exercises
17

User Authentication Using Public Key Certificates

  • Introduction
  • Using public-key cryptography for authentication
  • X.509 certificate structure
  • Authentication procedures
  • Extensions in version 3
  • Public key infrastructure
  • Certificate Management Protocol
  • XML key management protocol
  • Recapitulation
  • Exercises
18

Email Security: PGP and SMIME

  • Introduction
  • PGP (Pretty good privacy)
  • PGP goals
  • The reasons behind the success
  • PGP services
  • SMIME functionality
  • Recapitulation
  • Exercises
19

Transport Layer Security (TLS) and SSL

  • Introduction
  • Need for securing web transactions
  • Different ways to secure web traffic
  • TLS and SSL
  • Connections and sessions
  • TLS record protocol
  • TLS handshake protocol
  • Cryptographic computations
  • Recapitulation
  • Exercises
20

IP Security (IPsec)

  • Introduction
  • Need
  • IPsec functionality
  • Using IPsec
  • IPsec functioning
  • IPsec benefits
  • IPsec components
  • Why IKE
  • IPsec services
  • IPsec transport and tunnel modes
  • Deploying the security policy
  • Traffic processing
  • Encapsulating Security Payload (ESP)
  • ESP header design
  • Encryption and ICV calculation
  • Combining SAs
  • Recapitulation
  • Exercises
21

Wireless Security

  • Introduction
  • A brief about 802.11
  • Why wireless devices need higher security
  • Introduction 802.11i
  • Security services in Wi-Fi (802.11i)
  • 802.11i phases of operation
  • Discovery
  • Authentication phase
  • Key management
  • Secure data transfer
  • WPA3
  •  Wireless security for mobile phones
  • Recapitulation
  • Exercises

Any questions?
Check out the FAQs

  Want to Learn More?

Contact Us Now

Absolutely. With rising cyber threats, demand for cryptographers is soaring in industries like cybersecurity, finance, government, and tech. It’s a high-growth field offering challenging work, job security, and excellent pay. 

Salaries vary by experience and location, but: 

  • Entry-level: $90,000-120,000/year 
  • Mid-career: 120,000-160,000/year 
  • Senior: 160,000-250,000+ 

Basic algebra helps, but the course builds from fundamentals. Number theory and modular arithmetic are covered step-by-step. 

Yes, it aligns with concepts tested in CISSP, CEH, and CompTIA Security+, especially in cryptography domains. 

  • Cryptographer 
  • Security Engineer 
  • Penetration Tester
  • Network Security Analyst 
  • Cybersecurity Consultant 

Study Well, Defend Fiercely

  Master cryptography, stop breaches, and get paid because hackers never sleep, and neither should your skills.

$239.99

Buy Now

Related Courses

All Course
scroll to top