Encryption Best Practices
Encryption Best Practices
What Will We Learn?
Learners will become familiar with: Encryption at a medium-technical level (What it is and how to use it)
Able to describe: Security Considerations, Recognizing good vs. bad crypto
Exposed to: Quantum Cryptanalysis and Post-Quantum Cryptography
Ready to: Evaluate Effectiveness of Encryption Utilization
Target audience: General (non-security) IT employees, non-IT professionals engaged in enterprise risk assessment and cyber business impact analysis, or security-related professionals seeking additional skills.
Format: Interactive lecture, discussion, and lab; conducted live in-person or online consisting of the following elements:
- Pre-reading/handouts (approximately 10-15 pages)
- Lecture, presentation, and instructor-mediated discussion
- Breakout session with metacognitive exercise(s)
- Consolidation from breakout leading to shared understanding
- Session archival for future reference
Location
ESL Global Cybersecurity Institute
Our state-of-the-art Cyber Range and Training Center, located at the ESL Global Cybersecurity Institute on RIT’s campus in Rochester, NY. It is capable of hosting more than 5,000 virtual machines simultaneously in immersive scenarios, enabling Executive Incident Response Training, Threat Intelligence and Emulation Training, and more.
Within this infrastructure, we are able to introduce threat intelligence systems in scale replicas of any massive, global business, with specific focus on healthcare, energy, and finance. The Cyber Range and Training Center provides alternate reality instructional vignettes for cohorts of corporate leaders and IT security professionals to experiment and learn, facilitating research opportunities in the most critical of industries.