- New to IT professionals: Entry-level IT professionals will gain a foundational understanding of current cryptography concepts and techniques to support their career development.
- Early career professionals: Advancing IT professionals ready to move into a cybersecurity role will acquire applicable knowledge and skills to support them in future roles.
Learn alongside your team!
WatSPEED provides custom learning experiences tailored for large groups from any single
organization. Register three or more employees from the same organization and receive
15 per cent off. Contact our team at watspeed@uwaterloo.ca for details.
Learning outcomes
- Describe fundamental concepts, protocols, and technologies in cryptography
- Discuss practical applications of cryptography in securing internet communications
and data
- Explain how cryptography underpins blockchain technology and enables secure, decentralized
systems using privacy-enhancing cryptographic techniques
- Explore the dynamic landscape of modern cryptography, emphasizing the challenges and
opportunities that lie ahead
- Gain insight into the potential threats posed by quantum computing and the imperative
need for post-quantum cryptography
Module 1: Introduction to Cryptography
|
- Cryptography: definition, importance, real world significance
- Core principles of cryptography: confidentiality, integrity, authentication, non-repudiation
- Historical evolution of cryptography
- Fundamental concepts and terminology
- Symmetric vs. asymmetric cryptography
|
Module 2: Cryptography and Internet Security
|
- Introduction to internet security and cryptography: internet as a public network,
the necessity of cryptography online
- How cryptography secures online communications
- Public key infrastructure (PKI) and digital certificates
- SSL/TLS protocols and secure web browsing
- Cryptography in email security
- Viewing and understanding digital certificates
- Emerging technologies and future trends
|
Module 3: Encryption Algorithms and Protocols
|
- Introduction to encryption algorithms
- Symmetric encryption algorithms
- Asymmetric encryption algorithms
- Hashing functions and their purposes
- Cryptographic protocols
- Vulnerabilities and considerations
|
Module 4: Cryptography in Blockchain and Currency
|
- Introduction to blockchain technology
- Cryptographic hash functions and blockchain
- Public-key cryptography in blockchain transactions
- Digital signatures and their role in blockchain
- Consensus mechanisms and cryptography
- Cryptography in cryptocurrency wallets
- Privacy-enhancing technologies in blockchain
|
Module 5: Modern Cryptographic Challenges and Future Trends
|
- Introduction to modern cryptographic challenges
- The threat of quantum computing
- Post-quantum cryptography
- Role of cryptanalysis in cryptography
- Cryptography in emerging technologies (IoT, AI, etc.)
- Future trends in cryptography
|
- Instruction from a cryptography and privacy expert from the industry.
- Live 90-minute instructor-led sessions via Zoom on Wednesdays from 12 - 1:30 p.m. ET followed by optional 30-minute Q&A sessions for additional access to your instructor and peers.
- Weekly quizzes will reinforce your understanding of the material, and a final case
study assignment will apply your learning to solve real-world problems.
- Opportunities to receive personalized feedback from your instructor.
- Approximately five hours of online learning and independent work each week (including
two hours spent in live sessions and three hours completing individual activities
and assignments.
- Attendance requirement: Attendance is required for 80 per cent of weekly live instructor-led sessions. Sessions
will be recorded and made available for reference.
Academic requirements
- No specific pre-requisite knowledge is required but an understanding of fundamental IT concepts, including networking, operating systems, and basic programming, is strongly recommended.
Ken Muir
Chief Information Security Officer, LMC Security | Program Author and Instructor
Ken Muir is a globally recognized cybersecurity expert with over 30 years of experience.
Beginning his IT and Information Security career in 1993, he developed expertise in
viruses, threat intelligence, and security operations: consulting, building and rebuilding
security operations centers (SOC), and executive-level advisory roles.
Muir is also a chief information security officer (CISO); He helps organizations build
robust security strategies aligned with NIST CSF, CIS, and ISO 27001 frameworks. His
extensive background spans aerospace, energy, retail, finance, manufacturing, and
government sectors at provincial, state (US), and national levels. He holds multiple
industry certifications, including CISA and CRISC.