25.10.0
This website uses cookies to ensure you get the best experience on our website. Learn more

Black Hat Cryptography - Attacks, Tools & Techniques for Security Professionals [2115]

Crypto related vulnerabilities are super common! OWASP even ranks "Cryptographic Failure" as the second most common security vulnerability class in software. Yet, very often these vulnerabilities are overlooked by developers, code auditors, blue teamers and penetration testers alike. Because, lets face it: Nobody knows how cryptography works.

This course turns you into a powerful weapon. It will teach you how applied cryptography is commonly misused in the field and how this leads to exploitable bugs. Using case studies
from our own pentesting and red teaming engagements, we'll introduce core concepts of applied cryptography and how they fail in practice.

During the course you'll:

- understand how modern cryptography works
- find common crypto vulnerabilities in real software
- write crypto exploits for real software (and an IoT device)

At the end of the course you'll be able to spot an exploitable crypto bug from miles away (and be able to avoid them yourself)! No prior knowledge required.

Skills / Knowledge

  • PenTesting
  • Crypto
Job Insights

These are the most common job titles and employers with the most open positions related to this credential.

Showing results for United States.

2024-05 2024-05 2024-06 2024-06 2024-07 2024-07 2024-08 2024-08 2024-09 2024-09 2024-10 2024-10 2024-11 2024-11 2024-12 2024-12 2025-01 2025-01 2025-02 2025-02 2025-03 2025-03 2025-04 2025-04 Month 66,000 66,000 68,000 68,000 70,000 70,000 72,000 72,000 74,000 74,000 76,000 76,000 Salary (USD)