Black Hat Cryptography - Attacks, Tools & Techniques for Security Professionals [2115]
Crypto related vulnerabilities are super common! OWASP even ranks "Cryptographic Failure" as the second most common security vulnerability class in software. Yet, very often these vulnerabilities are overlooked by developers, code auditors, blue teamers and penetration testers alike. Because, lets face it: Nobody knows how cryptography works.
This course turns you into a powerful weapon. It will teach you how applied cryptography is commonly misused in the field and how this leads to exploitable bugs. Using case studies
from our own pentesting and red teaming engagements, we'll introduce core concepts of applied cryptography and how they fail in practice.
During the course you'll:
- understand how modern cryptography works
- find common crypto vulnerabilities in real software
- write crypto exploits for real software (and an IoT device)
At the end of the course you'll be able to spot an exploitable crypto bug from miles away (and be able to avoid them yourself)! No prior knowledge required.
Skills / Knowledge
- PenTesting
- Crypto
These are the most common job titles and employers with the most open positions related to this credential.
Showing results for United States.