Beyond the Beast (Deep Dives Into Crypto Vulnerabilities)

by NCC Group Claim Listing

This training is focused on drawing out the foundations of cryptographic vulnerabilities. These topics are timeless, and when the last application using ECB or CBC mode has upgraded - they’ll be the foundations of the next evolution of impactful and popular cryptographic vulnerabilities.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

NCC Group Logo

img Duration

Please Enquire

Course Details

This training is focused on drawing out the foundations of cryptographic vulnerabilities. These topics are timeless, and when the last application using ECB or CBC mode has upgraded - they’ll be the foundations of the next evolution of impactful and popular cryptographic vulnerabilities.

We’ll talk about attacks in the past that took advantage of cryptographic vulnerabilities. Additionally, we’ll look at how algorithms and protocols have evolved over time to address these concerns, what they look like now, and where they are found in respect to the most popular bugs today.

The other major areas we hit are cryptographic exploitation primitives such as chosen block boundaries, and more protocolrelated topics, such as how to understand and trace authentication in complex protocols.

This training is an extension of our research done day-in and day-out in the field. This includes sharing developing proofs of concept of attacks and teaching cryptography to anyone interested.

  • Leeds Branch

    2150 Century Way, Leeds
  • Manchester Branch

    XYZ Building 2 Hardman Boulevard, Manchester

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy