Cybersecurity

Core Concepts of Cryptography

This course offers a practical introduction to the core concepts of modern cryptography. You will learn how data is protected using symmetric and asymmetric encryption, hash functions, digital signatures, and certificates. Real-world examples will help you understand how these techniques are used in secure websites, emails, and messaging apps.

You will get hands-on experience using simple command-line tools to explore how cryptographic processes work. For example, you’ll try out hashing, key generation, and encryption directly in the terminal.

The focus is on building intuitive understanding rather than diving deep into complex mathematics.

By the end of the course, you’ll be able to explain and apply key cryptographic concepts with confidence in everyday digital contexts.

Content
  • Introduction to cryptography and its real-world relevance
  • Hash functions and how they ensure data integrity
  • Symmetric encryption: concepts, use cases, and tools
  • Asymmetric encryption: public/private key systems and key exchange
  • Digital signatures and digital certificates
  • Hands-on exercises using command-line tools (hashing, encryption, key generation)

Learning Outcomes

By the end of this course, participants will be able to:

  • Understand and explain key cryptographic concepts, including encryption, hashing, and digital signatures
  • Distinguish between symmetric and asymmetric encryption and describe their typical use cases
  • Use basic command-line tools to perform encryption, decryption, hashing, and key generation
  • Interpret how common security mechanisms (e.g. HTTPS, digital certificates) function in everyday digital interactions

Training Method

The course combines interactive lectures with hands-on practice to support both conceptual understanding and practical skills. Key topics are introduced through clear explanations, real-world examples, and visual aids. Participants will regularly use command-line tools in guided exercises to explore how cryptographic functions work in practice.

Certification
Participation Only
Prerequisites

Participants are encouraged—but not required—to be able to use command-line tools to explore cryptographic processes such as hashing, encryption, and key generation. 


Planning and location
Session 1
04/09/2025 - Thursday
16:00 - 19:00
Session 2
11/09/2025 - Thursday
16:00 - 19:00
Available Edition(s):

https://www.dlh.lu/web/image/product.template/1908/image_1920?unique=3a14eb3

This combination does not exist.

24.00 € 24.0 EUR 24.00 €

24.00 €

Not Available For Sale

Your trainer(s) for this course
Stefan Hommes