The session will introduce the principles of cryptography and show its strengths and limitations; it will also show how cryptography is used in cryptocurrencies such as Bitcoin and Ethereum.
Analysis of TSL server security and interception of TLS connection; analysis of the Bitcoin blockchain
- Teacher: Nuno Pedrosa
The module provides practical training and participants will gain a deep understanding of key regulations, privacy-enhancing technologies (PETs), and best practices for implementing effective data protection programmes. Master key encryption methods, anonymity techniques, zero-knowledge infrastructure setup, data security policies, and incident response strategies. Manage social engineering and phishing attacks, implement organised scarcity for effective security, anonymise data sharing, create digital authorities, and even learn how to revive systems after disasters. Gain the knowledge and skills to navigate the complex world of data protection with confidence.
- Teacher: Nuno Pedrosa
The module provides practical training and participants will gain a deep understanding of key regulations, privacy-enhancing technologies (PETs), and best practices for implementing effective data protection programmes. Master key encryption methods, anonymity techniques, zero-knowledge infrastructure setup, data security policies, and incident response strategies. Manage social engineering and phishing attacks, implement organised scarcity for effective security, anonymise data sharing, create digital authorities, and even learn how to revive systems after disasters. Gain the knowledge and skills to navigate the complex world of data protection with confidence.
- Teacher: Nuno Pedrosa