- Wolfgang RiedelRuben GonzalezBlack Hat Cryptography - Attacks, Tools & Techniques for Security Professionals [2115]Cody NelsonApril 1 - 2, 16 Credit Hours

Black Hat Cryptography - Attacks, Tools & Techniques for Security Professionals [2115]
Wolfgang Riedel
Crypto related vulnerabilities are super common! OWASP even ranks "Cryptographic Failure" as the second most common security vulnerability class in software. Yet, very often these vulnerabilities are overlooked by developers, code auditors, blue teamers and penetration testers alike. Because, lets face it: Nobody knows how cryptography works.
This course turns you into a powerful weapon. It will teach you how applied cryptography is commonly misused in the field and how this leads to exploitable bugs. Using case studies
from our own pentesting and red teaming engagements, we'll introduce core concepts of applied cryptography and how they fail in practice.
During the course you'll:
- understand how modern cryptography works
- find common crypto vulnerabilities in real software
- write crypto exploits for real software (and an IoT device)
At the end of the course you'll be able to spot an exploitable crypto bug from miles away (and be able to avoid them yourself)! No prior knowledge required.
Skills / Knowledge
- PenTesting
- Crypto
Issued on
Expires on
These are the most common job titles and employers with the most open positions related to this credential.
General Dynamics Information Technology