About the course
This course focuses on the central principles and techniques of cryptography and key management, and how they can be applied to achieve different security and trust objectives. By adopting a generic approach, it aims to deliver a core knowledge and understanding that can be applied or adapted to any situation, from system design to the implementation of a specification.
The course shows how different components work together to accomplish specific tasks. Also described are the key management requirements and solutions that are necessary to support the use of the constituent security elements, and how this may influence design decisions. This enables a balanced and complete overview and understanding of a security process.
The strengths, limitations and weaknesses of the different components are also discussed